In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreShatt Al-Hilla branches from the left of Euphrates River, U/S Hindiyah Barrage, Iraq, and extends about 100 km. It branches at the end into Shatt Al-Diwaniya 112 km and Shatt Al-Daghara 64 km. The study aims to evaluate and develop (Hilla-Daghara) rivers system, which is included Shatt Al-Hilla and Shatt Al-Daghara. Fieldwork began from (26 October until December) 2020. M9, S5 devices, and the installed staff gauges were used to measure discharges and water levels, respectively. A one-dimensional model was developed for the study area by HEC-RAS, after calibration and verification by field measurements; the Manning's n of Shatt Al-Daghara is found to be 0.022. Five Scenarios were simulated to study the reach under the cu
... Show MoreIn this work, the superconducting CuBa2LaCa2Cu4O11+δ compound was prepared by citrate precursor method and the electrical and structural properties were studied. The electrical resistivity has been measured using four probe test to find the critical temperature Tc(offset) and Tc(onset). It was found that Tc (offset) at zero resistivity has 101 K and Tc (onset) has 116 K. The X-ray diffraction (XRD) analysis exhibited that a prepared compound has a tetragonal structure. The crystal size and microscopic strain due to lattice deformation of CuBa2LaCa2Cu4O11+δ were estimated by four methods, namely Scherer(S), Halder-Wagner(H-W), size-strain plot (SSP) and Williamson-Hall, (W-H) methods. Results of crystal sizes obtained by these meth
... Show MoreA simulated ion/electron optical transport and focusing system has been put forward to
be mounted on high voltage transmission electron microscope for in situ investigations.
The suggested system consists of three axially symmetric electrostatic lenses namely an
einzel lens, an accelerating immersion lens, and a decelerating immersion lens, in addition
to an electrostatic quadrupole doublet lens placed on the image side. The electrodes
profile of these lenses is determined from the proposed axial field distributions. The
optical properties of the whole system have been computed together with the trajectory of
the accelerated charged-particles beam along the optical axis of the system. The computed
dimensions of th
This article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreBlockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreAbstract:
The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme
... Show More