The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
There is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreAbstract
Should be the goal of Government controls, including environmental controls and safety laws to protect citizens from the harmful effects of negative secreted by human's additions and changes in the environment. and perhaps the protection aspects of the protection of citizens from the adverse effects of communications towers, including those produced by towers of health effects. The people the right to choose the nature of the physical environment, which should not be imposed on them by others. Communications towers are one of the main problems that have been
... Show MoreThis study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by t
Amoxicillin have been conjugated with metronidazole as possible mutual prodrug to get a wider spectrum of activity by acting on aerobic and anaerobic bacteria, have antifungal activity, to provide protection for beta lactam ring of amoxicillin and also to improve patient compliance as it given as a single dose therapy. The structures of the synthesized compound were confirmed and characterized using elemental microanalysis (CHN), IR and some physiochemical properties. Biological study was done by using disc diffusion method against different bacterial strains which are , Staphylococcus aureus , Salmonella typhie , Pseudomonas aeruginosa , E. coli , Klebsiella pneumonia and fungi ( Candida albicans) . using nutrien
... Show MoreWe explore the transform coefficients of fractal and exploit new method to improve the compression capabilities of these schemes. In most of the standard encoder/ decoder systems the quantization/ de-quantization managed as a separate step, here we introduce new way (method) to work (managed) simultaneously. Additional compression is achieved by this method with high image quality as you will see later.
Viruses have not previously been reported to act as chemotactic/chemoattractive agents. Rather, viruses as extracellular entities are generally viewed as non-metabolically active spore-like agents that await further infection events upon collision with appropriate host cells. That a virus might actively contribute to its fate via chemotaxis and change the behavior of an organism independent of infection is unprecedented.