With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
Objective: To evaluate male patients complaining of
urethritis clinically according to the isolated organisms.
Method: A total of 100 male patients attending to of
Dermatological and Venereal private clinics for the period
April 2003 to November 2003 were included in the study.
Urethral swab was obtained from each male for culture and
direct immunofluorescence examination was done.
Demographic data was obtained, also.
Results: N. gonorrhoea was the predominate cause of
infection in 22%. A peak of infection was reported in the
second decade of age. Highest rate reported among single
males. A significant association was noticed between
profuse discharge and infection with gonorrhoea.
Conclusion: This
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
After this stage in the Bible is problematic and the profane in the poetry of the AL-Sayeghs,
and found that the poems path heading towards obey religious authority because of their wills
and powers, and the insurgency in other areas, as it did not employ shady methods and puns
and intriguing, and I find the reason for this is due to the fear poet focused toward the
influence of political Sergeant, more than effusion direction ascendancy religious sergeant,
was a AL-Sayeghs stop at this border; but went to the formulations problematic diversity in
the cognitive system, he tries it all to critique, as submitted by the history of the conflicts
produced generations of oppression and conflict and tension (what my fault I
The Immanence in S. Abdu; Saboor Poetry
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe time series of statistical methods mission followed in this area analysis method, Figuring certain displayed on a certain period of time and analysis we can identify the pattern and the factors affecting them and use them to predict the future of the phenomenon of values, which helps to develop a way of predicting the development of the economic development of sound
The research aims to select the best model to predict the number of infections with hepatitis Alvairose models using Box - Jenkins non-seasonal forecasting in the future.
Data were collected from the Ministry of Health / Department of Health Statistics for the period (from January 2009 until December 2013) was used
... Show MoreAbstract: Background: Staphylococcus aureus is Gram-positive bacteria that lives as a normal flora in living organisms but can be pathogenic to humans. Although a relatively unspectacular, nonmotile coccoid bacterium, S. aureus is a dangerous human pathogen in both community-acquired and nosocomial infections. Due to the increasing emergence of new strains of this antibiotic-resistant bacteria, it has become essential to approach different methods to control this pathogen. One of these methods is the antimicrobial photodynamic inactivation process using a low-level laser, in this paper, the Photodynamic effects of Rose Bengal and LLLL on the virulence factors of S.aureus were evaluated.
Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration p
... Show More