Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
The purpose of the state of tax is not only to achieve financial goals but also economic, social and other goals. And if the Iraqi state's orientation today in all its legislative, executive and independent institutions towards maximizing its tax resources, this goal can only be achieved through several legal means in reforming the tax system. This is what we discussed in the research of the six discussions. The first represents the unification of the various tax legislations in one law or two laws. Achieves clarity, certainty, justice and convenience. The second is the unification of the tax appeal bodies in a stable judicial system, the provisions and procedures that work on the consideration of tax deductions of any kind in a way that
... Show MoreThe variety of clean energy sources has risen, involving many resources, although their fundamental principles remain consistent in terms of energy generation and pollution reduction. The using of hydropower system for energy production also has a dynamic impact in which it utilizes to harness the water for the purpose of energy production. As it is important to overcome the problem of accidents in the highway and rural areas in the case of server rainfall and flood by implementation a smart system that used for energy production. This paper aims to develop a controlled hydropower system installed in the drainage sinks allocated in highway roads used for producing. The proposed system consists of storage unit represented by pipes used for t
... Show MoreThis paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreCryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show MoreCoronavirus disease (COVID-19) is an acute disease that affects the respiratory system which initially appeared in Wuhan, China. In Feb 2019 the sickness began to spread swiftly throughout the entire planet, causing significant health, social, and economic problems. Time series is an important statistical method used to study and analyze a particular phenomenon, identify its pattern and factors, and use it to predict future values. The main focus of the research is to shed light on the study of SARIMA, NARNN, and hybrid models, expecting that the series comprises both linear and non-linear compounds, and that the ARIMA model can deal with the linear component and the NARNN model can deal with the non-linear component. The models
... Show MoreThis study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show MoreBackground: Circulatory diseases are one of the leading causes of death in the world which continue to rise despite preventive measures.
Objective: To determine gender, age and cause specific trends of mortality due to circulatory diseases between 2007 and 2011 in Erbil city.
Methods: A review of registered death records from disease of circulatory system was performed at the statistical unit in Directorate of Health in Erbil city. No special codes for the cause of death were available on death certificate. Statistical analysis was done using SPSS version 19
Results: Diseases of circulatory system was responsible for 25.5% of total deaths during the study period. Highest rates were recorded at 2011 with 74 deaths per100000 popul
he present work, among other previous studies done in our lab, aimed to highlight the histopathological effect of S. xylosus peptidoglycan in comparison to LPS of E. coli. Materials and methods: One hundred and fifty urine specimens were collected from urinary tract infection patients visiting Baghdad hospitals. The histopathological effects of S. xylosus S24 peptidoglycan was studied in the urinary tract of female mice by injecting 5 animal groups at the following concentrations: 1000, 2000, 3000, 4000, and 5000 µg/mL. Another 5 groups were injected with 10, 25, 50, 75, and 100 ng/mL of E. coli (serotype 0128:B12) LPS. Results: Ten isolates were confirmed to be Staphylococcus xylosus. Histopathological study showed different pathological
... Show More