In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
The traffic congestion caused by the increase in the number of vehicles in the cities as a result of the increase in the population and the density of construction requires the provision of appropriate infrastructure and the provision of transport systems and logistics services that meet the needs of the population to meet the many challenges now and in the future by introducing various modes of transport , In accordance with integrated plans such as the use of (pedestrian friendly environments, bicycles and their own paths, light rail, metro, express bus, as well as public transport buses and others), through the development of Projects High-level roads, such as the annual and major roads, etc., and integrated with the urban planning of
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreThe present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition co
... Show MoreOver last decade, rapid growth in economic and population accompanied with depletion of the energy resources lead to serious impacts on environment and humanity. This development coupled with active constructions, which in some examples ignore the impact on the environment and human activities. Therefore, principle of sustainability has required in order to reducing this negative impact on the environment and the humanity.In developing countries, it seems that there is a huge gap between the current construction practices and sustainable principle, which need more attention to clarify and define the problems in order to find suitable solutions before it comes more difficult and expensive. The study aims to choose one of the develo
The aim of this investigation was to study the impact of various reaction parameters on wastewater taken from Al-Wathba water treatment plant on Tigris River in south of Baghdad, Iraq with sodium hypochlorite solution. The parameters studied were sodium hypochlorite dose, contact time, initial fecal coliform bacteria concentration, temperature, and pH. In a batch reactor, different concentrations of sodium hypochlorite solution were used to disinfect 1L of water. The amount of hypochlorite ions in disinfected water was measured using an Iodimetry test for different reaction times, whereas the Most Probable Number (MPN) test was used to determine the concentration of coliform bacteria. Total Plate Count (TPC) was utilized in this study to
... Show MoreContamination of the operating theatre is a major cause of nosocomial infection. This report aimed to show the types of microorganisms and their percentages cultivated from operating theatres of 16 health directorates of 14 Iraqi governorates (3 health directorates in Baghdad and 1 in each other 13 governorates) that was reported to the Pollution Control Section at Ministry of Health in Iraq from first of January to the end of June 2018. The data of all health directorates have included cultivation taken from governmental and private hospitals. Duhok, Erbil, Sulaymaniyah, and Nineveh were not involved in this report due to unavailability of their data during the above period. Escherichia coli, Pseudomonas aeruginosa and Staphylococcus aureu
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More