Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Abstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreThe study has used Geographic Information Systems (GIS) data and Arc GIS software, to produce a new map. This map contains a spatial database of the newly constructed buildings, in the area of water resources engineering college, and using the above tool for updating contains the college in any time, also the map and browse all buildings individually or in clustered, for example, browsing geometric data, statistical data and the plans of drawings, and make any necessary changes to these sectors immediately, or in the future, like the expansion of the study halls by constructed a new floor, or add supplements, prepare any electrical to any building, and anything else. The paper also, updates the old Google Earth image, f
... Show MoreThe research aims to measure the efficiency of health services Quality in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency for two types of orientation direction, which are input and output oriented direction.
The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).
In this study, SnO2 nanoparticles were prepared from cost-low tin chloride (SnCl2.2H2O) and ethanol by adding ammonia solution by the sol-gel method, which is one of the lowest-cost and simplest techniques. The SnO2 nanoparticles were dried in a drying oven at a temperature of 70°C for 7 hours. After that, it burned in an oven at a temperature of 200°C for 24 hours. The structure, material, morphological, and optical properties of the synthesized SnO2 in nanoparticle sizes are studied utilizing X-ray diffraction. The Scherrer expression was used to compute nanoparticle sizes according to X-ray diffraction, and the results needed to be scrutinized more closely. The micro-strain indi
... Show More
Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate
... Show MoreKirchhoff Time migration was applied in Pre and Post-Stack for 2D seismic survey for line AJ-99N, that is located in Ajeel oilfield in Salah Al-Din Governorate, Central Iraq. The process follows several accurate steps to reach the final time migration stage. The results of applied time migration give an accurate image for the Ajeel anticline reservoir and to improve the signal to noise ratio. Pre-Stack shows a clearer image for the structure in the study area, and the time-frequency analysis insure the result.
In this study, SnO2 nanoparticles were prepared from cost-low tin chloride (SnCl2.2H2O) and ethanol by adding ammonia solution by the sol-gel method, which is one of the lowest-cost and simplest techniques. The SnO2 nanoparticles were dried in a drying oven at a temperature of 70°C for 7 hours. After that, it burned in an oven at a temperature of 200°C for 24 hours. The structure, material, morphological, and optical properties of the synthesized SnO2 in nanoparticle sizes are studied utilizing X-ray diffraction. The Scherrer expression was used to compute nanoparticle sizes according to X-ray diffraction, and the results needed to be scrutinized more closely. The micro-strain indicates the broadening of diffraction peaks for nano
... Show More