Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block cipher algorithm
The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreThis study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreThe research aims to study the effect of adding (Li2O) to an alkaline glaze containing (K2O, Na2O). Although all the alkaline oxides have common properties, each oxide has something that distinguishes it. The molecular weight of (Li2O) is two times less than that of (Na2O) and three times that of (K2O). Therefore, it is added in small proportions. In addition, it is a very strong flux, so it is not used alone, but rather replaces a part of other alkaline oxides. It was added to an alkali glass that matured at a temperature of 980CO in proportions (2.0,1.4,1.2,0.8,0.4%) instead of (Na2O), using lithium carbonate (Li2CO3) as an oxide source. The glazes mixtures were applied to a white pottery body, and the samples were fired and cooled acc
... Show MoreTransient drop in the heart beat or transient heart block (AVB) may be consider the main cause of syncope or presyncope inpatients with bifascicular block and syncope According to the Guidelines for cardiac pacing pacemaker consider part of treatment. Aims of our study were to evaluate whether there is role for EPS in patients BFB and to evaluate the symptoms after pacing. 42 patients were enrolled in this study, with mean age value (63.4± 12.2years), suffer from interventricular conductive defect and syncope; patients underwent EPS on admission time, and pacemaker implantation accordingly and programmed follow up for the device in the last four years. Our patients were 25 (59.5%) male and 17 (40.5%)female, all of them with syncope o
... Show MoreGumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show Morewith an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important
This research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreThe COVID-19 pandemic has had a huge influence on human lives all around the world. The virus spread quickly and impacted millions of individuals, resulting in a large number of hospitalizations and fatalities. The pandemic has also impacted economics, education, and social connections, among other aspects of life. Coronavirus-generated Computed Tomography (CT) scans have Regions of Interest (ROIs). The use of a modified U-Net model structure to categorize the region of interest at the pixel level is a promising strategy that may increase the accuracy of detecting COVID-19-associated anomalies in CT images. The suggested method seeks to detect and isolate ROIs in CT scans that show the existence of ground-glass opacity, which is fre
... Show More