Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-BOX) base on the input key, shifting, chaotic theory (1D, 2D logistic map), and particle swarm algorithm. At the same time will be generated inverse of the table S-BOX through output of the S-BOX which will be generated from the suggestions above will return the values of the union of the row and the column for all the values generated for S-BOX. The S-BOX output is tested in several measurements represent (complexity, time, avalanche criterion, and balance) and the results show that any change in the input will change the output S-BOX also the proposed algorithm will be measured by the five statistical and NIST measurements all results will show a successful exception random excursions, random excursions variant (test not application ). The time needed to implement it requires only milliseconds and is approximated to the time taken for the original algorithm.
Efficient management of treated sewage effluents protects the environment and reuse of municipal, industrial, agricultural and recreational as compensation for water shortages as a second source of water. This study was conducted to investigate the overall performance and evaluate the effluent quality from Al- Rustamiya sewage treatment plant (STP), Baghdad, Iraq by determining the effluent quality index (EQI). This assessment included daily records of major influent and effluent sewage parameters that were obtained from the municipal sewage plant laboratory recorded from January 2011 to December 2018. The result showed that the treated sewage effluent quality from STP was within the Iraqi quality standards (IQS) for disposal and t
... Show MoreThe term ‘photometry’ refers to the accurate determination of the apparent brightness of an astronomical object. Until roughly 1980, nearly all astronomical photometry was done by means of analog measurements of photographic plates, or by analog or digital (photon-counting) techniques with photomultipliers. These photometers produced brightness readings which were typically displayed on dials, plotted on strip charts or printed on strips of paper, and it was often quite practical to analyse these raw data with pencil, paper and a slide rule or table of logarithms. However, during the late 1970s electronic area detectors for astronomy became more advanced: first, for a brief period, television-type cameras were employed, but these were s
... Show MoreThe aim of the current study is the investigation of tensile behavior of the semi - crystalline polymers : polypropylene (PP ) , high density polyethylene(HDPE) and low density polyethylene (LDPE) . The energy to break or deformation was determined as a function of extension rates , ( PP) was break at extension rate (5) mm/min but (HDPE) break at higher extension rates (25) mm/min while( LDPE) not break even at very high extension rates but it is deformation or failure .
Background: Endometrial cancer is the most common gynecologic malignancy in the United States and the fourth most common cancer in women, comprising 6% of female cancers.
Objectives: The aim of this study is to investigate the antioxidant vitamins, Coenzyme Q10 and oxidative stress in patients with endometrial cancer.
Patients and methods: Fifty six endometrial cancer women patients with various clinical stages (stage 1A, stage1B, stage II, stage III, stage IV) mean aged 58.055 ± 10.561 years, and 30 healthy women volunteers mean aged 39.731 ± 13.504 years, were includes as control group.
Results: The results in this study revealed a highly significant decreased (P<0.01) in β- carotene, Vitamin E and significant increased
This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreIntroduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThe effects of shot peening treatment (SPT) were studied at (10,20, and 30) minutes on the rotating bending fatigue behavior and the behavior of the alloy steel DIN 41Cr4 vibrations. The hardness test, tensile test, constant amplitude fatigue tests, and the vibration measurements were performed on samples with and without cracks at room temperature (RT), also, the fracture surface was examined and analyzed by a Scanning Electron Microscope (SEM). The results of the investigations, for example, Stress to Number of cycles to failure (S-N) curves, fatigue strength improvement factor of 5% to 10%, the decreasing percentage of maximum Fast Fourier Transform (FFT) acceleration of the shot-peened condition were compared to untr
... Show MoreThe concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en
... Show MoreBackground : Carpal tunnel syndrome (CTS) is the most common entrapment neuropathy of upper extremities and Open carpal tunnel release is the most frequent surgical procedure and the gold standard for cases that do not respond to conservative treatment. Aims :This study is used to evaluate the functional outcome of limited palmar mini-incision of carpal tunnel release. This study aims to determine the safety and symptomatic and functional efficacy of median nerve decompression with limited incision in carpal tunnel syndrome surgery. Patients and methods:Carpal tunnel release with a 1.5-2 cm limited palmar incision was performed on 20 patients. Patients were evaluated initially at one month after treatment according to symptom severity
... Show More