The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.
The Environmental Data Acquisition Telemetry System is a versatile, flexible and economical means to accumulate data from multiple sensors at remote locations over an extended period of time; the data is normally transferred to the final destination and saved for further analysis.
This paper introduces the design and implementation of a simplified, economical and practical telemetry system to collect and transfer the environmental parameters (humidity, temperature, pressure etc.) from a remote location (Rural Area) to the processing and displaying unit.
To get a flexible and practical system, three data transfer methods (three systems) were proposed (including the design and implementation) for rural area services, the fi
... Show MoreThe main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreThis study includes design and synthesis of new non-steroidal anti-inflammatory agents (NSAIDs) with expected cyclooxygenase-2 (COX-2) selective inhibition to achieve better activity and low gastric side effects. Two series of compounds have been designed and synthesized as potential NSAIDs,these are: Salicylamide derivatives (compounds 3,4,5 ) and Diflunisal derivatives (compounds 10&11). In vivo acute anti-inflammatory effect of one of the synthesized agents (compound 3) was evaluated in the rat using egg-white induced paw edema model of inflammation. Preliminary pharmacological study revealed that compound 3 exhibited less anti-inflammatory effect compared to that of aspirin after
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreAs the child is growing up, he goes through different phases which will be accompanied by physical and psychological changes. These changes set the basis for processes of designing and making children's clothes which in turn give its required benefits and meet the physiological, psychological and community needs. That will help provide the child with healthy physical and psychological growth.
The aim of this research is to recognize the decoration of clothes by colors and drawings and its role in clothes' richness and children's education. The research limits are objective, The limits are for female (3-5) years old. The research was done in teaching kindergarten in the college of education for women in 2016. The researchers found many
The current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general
... Show More