With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
In this paper, a study was made to determine the properties of Jovian radio bursts emitted at frequency 20.1MHZ. The data were provided from the Radio Jove archive for twelve years (2000-2012) for multi stations. The duration time for Long bursts (L) was (10-30) seconds and for Short bursts (S) was (10-20) seconds. The effect of radio bursts from the Sun and the galactic background were calculated at the same frequency and were found that radio bursts from the Sun will reduce the occurrence probability of Jovian radio bursts much more than radio bursts from the galactic background. The distribution of Jovian radio bursts was different; the occurrence probability with respect to the northern latitudes was more than the southern latitudes.
Introduction: The stringent response is a bacterial adaptation mechanism triggered by stress conditions, including nutrient limitation. This response helps bacteria survive under harsh conditions, such as those encountered during infection. A key feature of the stringent response is the synthesis of the alarmone (p)ppGpp, which influences various bacterial phenotypes. In several bacterial species, stringent response activation significantly affects biofilm formation and maintenance. Methods: Clinical specimens were collected from multiple hospitals in Baghdad, Iraq. Staphylococcus aureus was identified using conventional biochemical tests. The PCR technique was applied to detect mecA, icaA, and icaD genes, while the Vitek 2 compac
... Show MoreBackground: The COVID-19 pandemic has an immense effect not only on the social and economic lives of people but also on the surgical lives of surgeons, residents, nursing staff, and patients as well as ground level staff. Amidst this COVID pandemic, emergency surgeries were being done but at a decreased rate, whereas elective cases depended on the will of hospitals, surgeons, and patients. Study aims to promulgate a "Neo–Surgical Check Box" by amalgamating the WHO surgical checklist and the results obtained from the questionnaires.
Subjects and Methods: After receiving ethical clearance from the Institute Ethical Committee, an online questionnaire with 50 questions divided into
... Show MoreThis paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type
... Show MoreThe experiment was conducted in Al- Mahaweel Research Station in Babel Governorate, Ministry of Agriculture during autumn season 2016-2017 to determine the role of irrigation management processes and micronutrient fertilization in growth and productivity of two varieties of wheat IPA 99 and Al-Rasheed 22 in clay loam soil classified as Typic Torriflovent. The experiment included four irrigation treatments and six fertilization treatments. The experiment was designed under randomized complete block design (RCBD) with three replications. Wheat grain IPA 99 and Al-Rasheed 22 varieties were planted in 23/11/2016 and harvested in 13/5/2017. The amount and periods of irrigation depended on sensors reading of volumetric water content was measured
... Show MorePolarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn this study, an easy, low-cost, green, and environmentally
friendlier reagents have been used to prepare CdS QDs, in chemical
reaction method by mixed different ratio of CdO and sulfur in
paraffin liquid as solvent and oleic acid as the reacting media in
different concentration to get the optimum condition of the reaction
to formation CdS QDs. The results give an indication that the
behavior is at small concentration of 4ml of the oleic acid is best
concentration which give CdS QDs of small about to 9.23 nm with
nano fiber configuration.