In this paper a design of new robust and dynamic cryptosystem using stream key generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexible to encrypt (decrypt) different types of data; like message text and image data efficiently. Also we suggest using software protection for RDSCC which is represented by partitioned the cryptosystem file into two parts, each one saved in different memories to keep it in save from any attack. Lastly, the proposed generator and the cryptosystem are implemented practically and the main interfaces of the two programs are shown in this paper. These interfaces are programmed with GUI MATLAB2017.
War is one of the phenomena accompanying the human race since ancient times, so we find that the human element has mastered the use manufacture of weapons and worked on their development in order to provide means of protection and prevention from any external aggression by the enemies. The rapid developments on those weapons has led to an increase in their danger, Therefore, we find that the world limits their use production and that’s why many treaties have been concluded to dismantle them and limit their spread, and to preserve the security and stability of countries from the negative damages resulting from non-conventional weapons. From this standpoint, there are many existing international efforts to prevent the spread of non-conve
... Show MoreThe increase in the number of people with special needs in general, and especially the category of the disabled, whose numbers in the communities reached about 10% - 15% (900 million disabled people in the world, on the other hand, the confirmation of constitutional texts and international conventions and domestic legislation to approve The study deals with the most important aspects of legal protection, namely, penal protection, in its procedural form. This study deals with the extent of its adequacy and its suitability to the disabled entity, which represents some of the shortcomings of its functions in contrast to its normal hypothesis. In other words, In the case of being (Jana) in the crime in view of the guarantees that a normal pe
... Show MoreIn this work, porous silicon (PS) are fabricated using electrochemical etching (ECE) process for p-type crystalline silicon (c-Si) wafers of (100) orientation. The structural, morphological and electrical properties of PS synthesized at etching current density of (10, 20, 30) mA/cm2 at constant etching time 10 min are studied. From X-ray diffraction (XRD) measurement, the value of FWHM is in general decreases with increasing current density for p-type porous silicon (p-PS). Atomic force microscope (AFM) showed that for p-PS the average pore diameter decreases at 20 mA. Porous silicon which formed on silicon will be a junction so I-V characteristics have been studied in the dark to calculate ideality factor (n), and saturation current (Is
... Show More The present study aimed at ((building an educational -learning design based on the theory of Merrill in (CDT) and measuring the effectiveness of this design in the motivation and achievement of the high school fifth grade students to art education in the subject of the history of modern art)). The research community is made of fifth grade preparatory students in the secondary school of Umm Ayman in the Directorate of Education of Baghdad / Ar-Rusafa in a simple random way. The study sample (58 students) was chosen from section (e) to study according to Merrill theory (CDT) and section (d) to study according to the traditional way.
The pilot design of the control and experimental equivalent groups that have partial control in t
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreIraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for
... Show MoreThe Wiener filter is widely used in image de-noising. It is used to reduce Gaussian noise. Although the Wiener filter removes noise from the image, it causes a loss of edge detail information, resulting in blurring of the image. The edge details are considered high-frequency components. The Wiener filter is unable to reconstruct these components. In this paper, the proposed filter based on the Wiener filter and the high-boost filter for medical images is presented. The proposed filter is applied to the degraded image. First, using Fourier Transformation, the degraded image and the high boost filter are converted in the frequency domain. Secondly, the wiener filter is applied to the image along with the high boost filter. Thirdly
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreThis work presents an approach to deal with modelling a decision support system framework to introduce an application for decisions in medical knowledge system analysis. First aid is extremely important worldwide and, hence, a decision support framework, know as First Aid Decision Support System (FADSS), was designed and implemented to access experimental cases exerting danger to the general population, offering advanced conditions for testing abilities in research and arranging an emergency treatment through the graphical user interface (UI). The design of first aid treatment in FADSS depends on the general cases in first aid. We presented a strategy to manage first aid treatment by modelling an application (FADSS) that assists pe
... Show MoreNanostructured Al2O3has been applied as a protective coating against corrosion of the carbon steel (C.S) in seawater environment (3.5% NaCl) at temperatures range (298-328)K. Aluminananoparticles were deposited on carbon steel substrates by cathodic electrophoretic deposition (EPD) with ethanol as suspension medium and poly(acrylic acid) (PAA) as polymeric charging agent. Meanwhile, thesurface morphology was examined using Atomic-force microscopy (AFM). The cross-section AFM showed that the particles sizes for the Al2O3 NPs is around 60-80 nm. The anticorrosion behaviour of coated C.S was investigated in 3.5% NaCl at temperature range 298-328 K by potentiodynamic polarization measurements. Results show that using PAA in suspension coat incr
... Show More