In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThe reticuloendothelial system (RES) play an important role in immunity against bacterial infection and Klebsiella pneumoniae one of the most common causes of hospital-acquired infections. Dextran70 (D70), a polysaccharide, may alter functions of this system through changing many biological activities in the tissues.
Kurdistan power system is expanded along years ago. The electrical power is transmitted through long transmission lines. The main problem of transmission lines is active and reactive power losses. It is important to solve this issue, unless, the most of electrical energy will lost over transmission system. In this study, High Voltage Direct Current links/bipolar connection were connected in a power system to reduce the power losses. The 132kV, 50 Hz, 36 buses Kurdistan power system is used as a study case. The load flow analysis was implemented by using ETAP.16 program in which Newton-Raphson method for three cases. The results show that the losses are reduced after inserted HVDC links.
In this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.
Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.