With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
In this work, the spectra of plasma glow produced by Nd:YAG laser operated at 1.064 μm on Al-Mg alloys with same molar ratio samples in air were analyzed by comparing the atomic lines of aluminum and magnesium with that of strong standard lines. The effect of laser energies on spectral lines, produced by laser ablation, were investigated using optical spectroscopy, the electron density was measured utilizing the Stark broadening of magnesium-aluminum lines and the electron temperature was calculated from the standard Boltzmann plot method. The results that show the electron temperature increases in magnesium and aluminum targets but decreases in magnesium: aluminum alloy target, also show the electron density increase all the aluminum,
... Show MoreCorrosion Resistance Enhancement for low carbon steel is very important to extend its life service, the coating process is one of the methods which can using to achieve this, and it's the most important in surface treatments to improve the properties of metals and alloys surfaces such as corrosion resistance. In this work, low carbon steel was nitrided and coated with nano zinc using gas phase coating technical, to enhance the resistance of corrosion. The process included adding two layers. The first, a nitride layer, was added by precipitating nitrogen (N) gas, and the second, a zinc (Zn) layer, was added by precipitating Zn. The process of precipitating was carried out at different periods (5, 10, and 15 minutes). Scan electron mi
... Show MoreAbstract
Paraffin wax is utilized for the heat storage applications taking advantage from the high stored latent heat during the phase change (from solid to fluid) period. What isn't right with this procedure is that the wax has a little heat transfer rate because of its low thermal conductivity. The thermal conductivity improvement of the paraffin wax has been examined utilizing nano-material with high thermal conductivity. In the recent study, (Al2O3) nanoparticles with weights of 1, 2, and 3% of the paraffin wax were added to the paraffin wax. The Iraqi paraffin wax accessible at the local markets was utilized as a phase change material (PCM).
Many properties of the
... Show MoreIn this research, geopolymer mortar had to be designed with 50% to 50% slag and fly ash with and without 1% micro steel fiber at curing temperature of 240℃. The molarity of alkaline solution adjusted with 12 molar sodium hydroxid to sodium silicate was 2 to 1, reaspectivly. The heat of curing increased the geopolymerization proceses of geoplymer mortar, which led to increasing strength, giving the best result and early curing age. The heat was applied for two days by four hours each day. It was discovered in the impact test that the value first crack of each mix was somewhat similar, but the failure increased 72% for the mixture that did not contain fiber. For the energy observation results it was shown that the mixt
... Show MoreIn Iraq, there is a limited research work exploring the clinical pharmacists' role from the point of view of other healthcare professionals.
To investigate physicians' assessment of clinical pharmacy services at Baghdad hospitals, and compare junior physicians with senior physicians' point of view.
The study was conducted in twelve governmental hospitals in Baghdad, Iraq. Data was collected from a sample of two hundred physicians, and through a validated, self-administered questionnaire, which comprised twenty statements in addition to a non-personal information form that precedes the questionnaire
The study findings reveal a somewhat positive point of view towards clinical pharmacists' performance in
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Background: This study aimed to determine the gender of a sample of Iraqi adults using the mesio-distal width of mandibular canines, inter-canine width and standard mandibular canine index, and to determine the percentage of dimorphism as an aid in forensic dentistry. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the mandibular canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; paired sample t-test was used to evaluate the side difference of
... Show More