A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algorithm could be more robust compared to the MITMA, in addition to several security features. The proposed algorithms scale down the computation complexity by decreasing the arithmetic operations, to make the algorithms the lowest workload and suitable for application in restricted resource environments.
Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThe aim of this study to investigate the microbial load and type of preservative for the types of yogurt available in the Iraqi market to ensure the safety of food provided to the consumer and protect through examining the types of yogurt from harmful bacteria as well as to contain ratios acceptable to yeasts and molds is to find out by comparing models curd careless Iraqi standard quality(ISQ) and see how they conform to these specifications have been collecting 12 brands of yoghurt types it was been (Kala, Activia 1, Activia 2, Mazia, Shelan, Aib, Mersin, Morsi, Al-Safi, Zabady, Zakho, Arbil). Bacteriological tests were conducted on samples of yogurt (total bacterial count, coliform count, counting yeasts and molds). The results showed
... Show MoreThis paper presents stochastic analysis using the perturbation method to model the structure of a container to verify the distributions of probability of maximum and minimum axial forces reactions in piles. The proposed simulation of a container port terminal under 11 scenarios of load combinations was presented. The probability distributions for live loads are assigned according to the input parameters of simulation data. Part of the load itself is implicitly combined such as vertical live load which includes the weight of equipment and containers and wind load. The structural model was simulated in the software STAAD Pro., while the statistical analyses were performed with MATLAB. The results demonstrated that, the most significant extern
... Show MoreThe objective of this study was shed light for cultivation and maintenance of Trichomonas vaginalis parasite growth after isolated it by vaginal swaps from females suffering vaginitis and abnormal vaginal discharges in these media CPLM and TAB media to detect growth curve, morphological changes and viability of parasite in the two culture media, together with effect of sheep and bovine serum on the growth of it. The results of this studies were showed there was abtaine differences between the two types of media , The maximum growth of parasite was in TAB medium after 72 hours incubation with use of bovine serum, while such growth was maximized after 144 hours incubation with the use of sheep serum. In CPLM medium, a maximum gro
... Show MoreIn this research, we study the classical continuous Mixed optimal control vector problem dominated by couple nonlinear elliptic PDEs. The existence theorem for the unique state vector solution of the considered couple nonlinear elliptic PDEs for a given continuous classical mixed control vector is stated and proved by applying the Minty-Browder theorem under suitable conditions. Under suitable conditions, the existence theorem of a classical continuous mixed optimal control vector associated with the considered couple nonlinear elliptic PDEs is stated and proved.
In this paper, the proposes secure system to improving security of ID card and passports is by generating cubic spline co-occurrence code (CCO code) for each ID card. The authentication part, begins passing ID card through the checkpoint then the checkpoint will check the information of card or passport by also extracting features in order to generate the cubic spline co-occurrence code (CCO code), finally comparison is made between extracted CCO code at the checkpoint and CCO code that has been printed on ID card or passport (type of fraud like change personal picture or fraud it’s information). Several tests were conducted to evaluate the performance of the proposed security system. Furthermore, the experiment results reveal that the
... Show MoreA simplified parallel key was presented in this work for the Taxa of Stackys L. wildly grown in Iraq. Three records within this genus were newly recorded to our country in the present work and they are S. kermanshahansis Rech S. setifera C.A. Mey. subsp setifera, S. setifera ssp iranica (Reck.) The characteristics of these new records were also given with some representative specimens.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreBackground:
Hepatitis C Virus is the main causative agent of hepatitis among blood transfused patients, in which most chronic cases result in liver carcinoma.
Materials & Methods:
Enzyme-Linked Immunosorbent Assay for HCV, FNF- and IL-12p40 estimation with Recombinant Immunoblotting Assay (RIBA) as a confirmatory test for HCV, have been
applied for HCV detection in 80 HCV patients' samples in comparison with 30 samples for apparently healthy control, while viral load has been estimated using Branched-DNA (b-
DNA) technique for 32 randomly selected positive cases for HCV. Liver function test has been applied for patients' sera in comparison with control.
Results & Conclusions:
This study re