Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.
The search included a comparison between two etchands for etch CR-39 nuclear track detector, by the calculation of bulk etch rate (Vb) which is one of the track etching parameters, by two measuring methods (thichness and change mass). The first type, is the solution prepared from solving NaOH in Ethanol (NaOH/Ethanol) by varied normalities under temperature(55˚C)and etching time (30 min) then comparated with the second type the solution prepared from solving NaOH in water (NaOH/Water) by varied normalities with (70˚C) and etching time (60 min) . All detectors were irradiated with (5.48 Mev) α-Particles from an 241Am source in during (10 min). The results that Vb would increase with the increase of
... Show MoreThe search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
In this study, the effect of fire flame on the punching shear strength of steel fiber reinforced concrete flat plates was experimentally investigated using nine half-scale specimens with dimensions of 1500×1500 mm and a total thickness of 100 mm. The main investigated variables comprised the steel fiber volume fraction 0, 1, and 1.5% and the burning steady state temperature 500 and 600 °C. The specimens were divided into three groups, each group consists of three specimens. The specimens in the first group were tested with no fire effect to be the reference specimens, while the others of the second and third groups were tested after being exposed to fire-flame effect. The adopted characteristics of the fire test were; (one hour) b
... Show MoreIn this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e
... Show MoreBackground: Bacterial DNA released upon bacterial autolysis or killed by antibiotics, hence, many inflammatogenic reactions will be established leading to serious tissue damage. Aim: the present work aimed to elucidate the histopathological changes caused by prokaryotic (bacterial) DNA and eukaryotic (candidal) DNA. Materials and methods: twenty one Staphylococcus aureus and 36 Candida albicans isolates were isolated from UTI patients. Viable cells and DNA of the highest antibiotic sensitive isolates were injected, intraurethraly, in mice. Results were evaluated via histopathological examination. Results: Mildest reactions were obtained from mice challenged with viable C. albicans compared with those challenged with viable S. aureus. Dos
... Show MoreA number of nitrones have been synthesized in three different procedures, starting with N-phenyl hydroxylamine, followed by the condensation reaction with some selected aldehydes. Furthermore, these nitrones were employed in the preparation of a number of new isoxazolidines. Cycloaddition reaction of nitrones to styrene produced the desired products.
The research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act
... Show More