The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
For the purpose of studying the effect of the quality of food on the growth and reproduction of crustaceans the type of Cyclops scutifer were used which ranked as the first record in Iraq and the test was bred and classification. To find out the effect of the quality of food on this type it has been selected three groups of food. The first group was chlorophyll, the second group was chlorophyll with Paramecium and the third group was chlorophyll with larvae of mosquitoes in its early stages. After collections the results and conduct statistical test (F test), the results found that the quality of food had great influence on the growth of animals and productivity the impact was clear on the stages of growth and transiti
... Show MoreHippuric acid and 3-amino phenol were used to make the 4-(2-Amino-4-hydroxy-phenylazo)-benzoylamino-acetic acid diazonium salt, a new Azo molecule that is a derivative of the (4-Amino-benzoylamino)-acetic acid diazonium salt. We found out what the ligand's chemical structures were by using information from 1HNMR, FTIR, CHN, UV-Vis, LC-mass spectroscopy, and thermal analyses. To make metal complexes of the azo ligand with Co(II), Cu(II), Ru(III), and Rh(III) ions, extra amounts of each azo ligand were mixed with metal chloride salts in a 2:2 mole ratio. The stereochemical structures and geometries of the metal complexes that were studied were guessed based on the fact that the ligand exhibited tetradentate bonding behavior when combined w
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreThis research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the import
A newly developed analytical method characterized by its speed and sensitivity for the determination of metoclopramide hydrochloride (MCP-HCl) in pure and pharmaceutical preparation via turbidimetric measurement (0-180o) by Ayah 6SX1-T-2D Solar cell-CFI Analyser. The method was based on the reaction of phosphomolybdic acid with metoclopramide hydrochloride in acidic medium to form yellowish white precipitate for the ion-pair complex. Turbidity was measured via the reflection of incident light that collides on the surface precipitated particles at 0-180o. Chemical and physical parameters were studied and optimized. The calibration graph was linear in the range of 0.0005-3 or 0.0005- 4 mMol.L-1, with correlation coefficient r = 0.9947&
... Show MoreThe present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain oc
... Show More