The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
Reconstruction of female identity is one of the important issues in modern times. The majority of the females who descent from the countries of the third world confront lots of problems because of their race and gender. Black females or colored skin females because of the oppression of the white society upon them, try hard to cope with society in order to get some relief and feel that they are part of this cruel white society. One of the solutions for these black females is to reconstruct their identity by mimicry to the English beauty standards. Zadie Smith is a postcolonial author. She deals with third- world women and how they are treated in a minority and in a racist way. She strives to empower the subaltern black females who ha
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show MoreThis article addresses a new numerical method to find a numerical solution of the linear delay differential equation of fractional order , the fractional derivatives described in the Caputo sense. The new approach is to approximating second and third derivatives. A backward finite difference method is used. Besides, the composite Trapezoidal rule is used in the Caputo definition to match the integral term. The accuracy and convergence of the prescribed technique are explained. The results are shown through numerical examples.
This work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+
... Show MoreProblem of water scarcity is becoming common in many parts of the world. Thus to overcome this problem proper management of water and an efficient irrigation systems are needed. Irrigation with buried vertical ceramic pipe is known as a very effective in management of irrigation water. The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the software HYDRUS/2D to predict empirical formulas that describe the predicted results accurately. Different values of pipe lengths and hydraulic conductivity were selected. In addition, different values of initial volumetric soil water content were assumed in this simulation a
... Show MoreAbstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show MorePurpose: The diagnosis and determine the level of balance between the time available for life and work with the doctors in the hospitals of t the six hospitals in the City of Medicine.
Design / methodology / Approach: It has been relying on ready-scale, to make sure the diagnosis and determine the level of balance between the time available for life and work, where they were distributed on Form 42 doctors in the six hospitals in the City of Medicine, were analyzed by software (Nvivo and SPSS v.22).
Results: The results showed that there is a good level of balance between the time available for life and work with the doctors.
Research limitations: The diffi
... Show MoreThis study attempts to test the interactive role played by organizational agility in enhancing the effect of organizational anomie on the behavior of planned human resources. The study of organizational anomie has increased because of the moral and legal pressures facing the organization by the external environment within its framework. To adapt to all external developments faced by these organizations, the behavior of human resources planned reflects the ability of individuals to control their behavior in different situations and situations that face them in the work.
The problem of the research indicates that there is a clear lack of understanding of what is meant by the variables studied in the sample
... Show MoreBreast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. T
... Show More