Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreThis research includes the synthesis of some new different heterocyclic derivatives of 5-Bromoisatin. New sulfonylamide, diazine, oxazole, thiazole and 1,2,3-triazole derivatives of 5-Bromoisatin have been synthesized. The synthesis process started by the reaction of 5-Bromoisatin with different reagents to obtain schiff bases of 5-Bromoisatin intermediate compounds(1, 8, 19) by using glacial acetic acid as a catalyst in three routes. The first route, 5-Bromoisatin reacted with p-aminosulfonylchloride to product compound(1), then converted to sulfonyl amide derivatives(2-7) by the reaction of compound(1) with different substituted primary aromatic amine in absolute ethanol. The second route includes the reaction of 5-Bromoisatin rea
... Show MoreAbstract The Synthesis in good yields of some new 1,8-Naphthyridine derivatives (1-9) and characterized on the basis of IR and 1H NMR spectra data. The compounds (1) and (6) were utilized as a starting material for the preparing of these compounds.
Reaction of L1 [((E)-N1-(nitrobenzylidene)benzene-1,2-diamine] and L2( m-aminophenol), and one equivalent of di- or tri-valent metals(Cr(ӀӀӀ), Mn(ӀӀ), Fe(ӀӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ) afforded the complexes [M(L1)(L2)2]Cl, M=Cr(ӀӀӀ) and Fe(ӀӀӀ) and the complexes [M(L1)(L2)2] M= Mn(ӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ). The structure of the Schiff base ligand and their complexes are characterized by (C:H:N), FT.IR, UV.Vis, 1HNMR, 13CNMR and mass spectral. The presence of metal in the complexes are characterized by flame atomic absorption. The spectral data of the complexes have revealed the octahedral geometry. The (L1), (L2) and mixed ligand metal complexes were screened for their ability as cataly
... Show MoreThe present study was performed to evaluate the anti-fungal effect of alcoholic extract of Solanum nigrum (AESn) on the growth of Microsporum canis, the causes agent of ring worm. The results of this work referred to the inhibitory effect of the studied extract on the growth of tested fungi. The percentages of inhibition were (7.88 %, 19.88%, 23.41%, 57.65%), in comparison to the control, when (2%, 4%, 6%,8% ) of tested extract were used, respectively. The data illustrated that the higher concentrations of the extract are applied, the more inhibition of fungal growth is produced.
Ab – initio restricted Hartree - Fock method within the framework of large unit cell (LUC) formalism is used to investigate the electronic structure of Si and Ge nanocrystals. The surface and core properties are investigated. A large unit cell of 8 atoms is used in the present analysis. Cohesive energy, energy gap, conduction and valence band widths are obtained from the electronic structure calculations. The results are compared with available experimental data and theoretical results of other investigators. The calculated lattice constant is found to be slightly larger than the corresponding experimental value because we use only 8 atoms and we compared the results with that of the bulk crystals, nanoclusters are expected to have str
... Show MoreHigh frequencies of multidrug resistant organisms were observed worldwide in intensive care units which is a warning as to use the only few effective antimicrobials wisely to reduce selective pressure on sensitive strains.
The aim of the current study is to asses the compliance of the currently followed antibiotic prescribing pattern in the intensive care unit in an Iraqi hospital with the international guidelines.A cross-sectional study was done in the intensive care unit (ICU) of the Surgical Specialties Hospital, Medical City in Bagdad from the 30th of November 2011 to the 5th of May 2012.Patients were followed until they were discharged or died to see any change in condition, response to drugs, devices u
... Show MoreTwitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show More