Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Augmented Reality Technology among students of the Optimum Invesment Project fot Teaching Personnel Program and the difficulties they face at Al-Shaqra University
...Show More Authors

Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 16 2020
Journal Name
Synthetic Communications
Synthesis, identification and molecular docking studies of N-functionalized piperidine derivatives linked to 1,2,3-triazole ring
...Show More Authors

View Publication Preview PDF
Crossref (4)
Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Evaluation Antibacterial Activity of Some New Substituted 5-Bromoisatin Containing Five, Six Heterocyclic Ring
...Show More Authors

This research includes the synthesis of some new different heterocyclic derivatives of 5-Bromoisatin. New sulfonylamide, diazine, oxazole, thiazole and 1,2,3-triazole derivatives of 5-Bromoisatin have been synthesized. The synthesis process started by the reaction of 5-Bromoisatin with different reagents to obtain schiff bases of 5-Bromoisatin intermediate compounds(1, 8, 19) by using glacial acetic acid as a catalyst in three routes. The first route, 5-Bromoisatin reacted with p-aminosulfonylchloride to product compound(1), then converted to sulfonyl amide derivatives(2-7) by the reaction of compound(1) with different substituted primary aromatic amine in absolute ethanol. The second route includes the reaction of 5-Bromoisatin rea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis of some heterocyclic derivatives of 1,8-Naphthyridine with a new substitution on the Naphthyridine ring
...Show More Authors

Abstract The Synthesis in good yields of some new 1,8-Naphthyridine derivatives (1-9) and characterized on the basis of IR and 1H NMR spectra data. The compounds (1) and (6) were utilized as a starting material for the preparing of these compounds.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 08 2023
Journal Name
Egyptian Journal Of Chemistry
Ring Opining polymerization of caprolactone And Antibacterial activity by Mixed Ligand of Metal(II) and (III)
...Show More Authors

Reaction of L1 [((E)-N1-(nitrobenzylidene)benzene-1,2-diamine] and L2( m-aminophenol), and one equivalent of di- or tri-valent metals(Cr(ӀӀӀ), Mn(ӀӀ), Fe(ӀӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ) afforded the complexes [M(L1)(L2)2]Cl, M=Cr(ӀӀӀ) and Fe(ӀӀӀ) and the complexes [M(L1)(L2)2] M= Mn(ӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ). The structure of the Schiff base ligand and their complexes are characterized by (C:H:N), FT.IR, UV.Vis, 1HNMR, 13CNMR and mass spectral. The presence of metal in the complexes are characterized by flame atomic absorption. The spectral data of the complexes have revealed the octahedral geometry. The (L1), (L2) and mixed ligand metal complexes were screened for their ability as cataly

... Show More
View Publication
Publication Date
Mon Apr 23 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Antifungal Activity of Solanum nigrum Extract Against Microsporum canis, The Causative Agent of Ring Worm Disease
...Show More Authors

    The present study was performed to evaluate the anti-fungal effect of alcoholic extract of Solanum nigrum (AESn) on the growth of Microsporum canis, the causes agent of ring worm. The results of this work referred to the inhibitory effect of the studied extract on the growth of tested fungi. The percentages of inhibition were (7.88 %, 19.88%, 23.41%, 57.65%), in comparison to the control, when (2%, 4%, 6%,8% ) of tested extract were used, respectively. The data illustrated that the higher concentrations of the extract are applied, the more inhibition of fungal growth is produced. 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Ab–Initio large unit cell calculations of the electronic structure of Si and Ge nanocrystals
...Show More Authors

Ab – initio restricted Hartree - Fock method within the framework of large unit cell (LUC) formalism is used to investigate the electronic structure of Si and Ge nanocrystals. The surface and core properties are investigated. A large unit cell of 8 atoms is used in the present analysis. Cohesive energy, energy gap, conduction and valence band widths are obtained from the electronic structure calculations. The results are compared with available experimental data and theoretical results of other investigators. The calculated lattice constant is found to be slightly larger than the corresponding experimental value because we use only 8 atoms and we compared the results with that of the bulk crystals, nanoclusters are expected to have str

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Trend of Antibiotics Usage in the Intensive Care Unit in the Medical City in Baghdad
...Show More Authors

High frequencies of multidrug resistant organisms were observed worldwide in intensive care units which is a warning as to use the only few effective antimicrobials wisely to reduce selective pressure on sensitive strains.

The aim of the current study is to asses the compliance of the currently followed antibiotic prescribing pattern in the intensive care unit in an Iraqi hospital with the international guidelines.A cross-sectional study was done in the intensive care unit (ICU) of the Surgical Specialties Hospital, Medical City in Bagdad from the 30th of November 2011 to the 5th of May 2012.Patients were followed until they were discharged or died to see any change in condition, response to drugs, devices u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref