Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.
BACKGROUND: Keratoconus is a progressive non inflammatory bilateral (usually asymmetric) ectatic corneal disease characterized by paraxial stromal thinning ,weakening that lead to corneal surface distortion ,vision loss primarily from irregular astigmatism and myopia and secondly from corneal scar. OBJECTIVE: To evaluate visual and refractive outcomes after intracorneal continuous ring (ICCR) implantation combined with intrapocket corneal collagen cross linking in patient with keratoconus. Setting: Eye Specialty Private Hospital, Baghdad, Iraq. METHODS: This study assessed the results of implantation of Myoring ICCR combined with CXL in 40 eyes with KC. Outcome measures include UDVA,CDVA(spectacle correction),refraction, complications and s
... Show MoreSynthesis and study liquid crystalline properties of new compounds with terminal groups of amides ([III]a-c,[IV]a-c and [VI]n), alkoxy series[V]n or ester with azo linkage ([IX]a-c and[X]a-c) containing thaizole ring. These series were synthesized by many steps starting from 4- hydroxyacetophenone or 4-aminoacetophenone. The synthesized compounds were characterized using melting points, FTIR, C.H.N.S analysis and for some of them 1H NMR spectroscopy. The liquid crystalline properties were studied by hot stage polarizing microscopy and differential scanning calorimetry DSC. All compounds of series [III]a-c,[IV]a-c and compounds [V]n showed enantiotropic liquid crystal. While the series [VI]n showed nematic mesomorphism except [VI]8 did not s
... Show MoreEvaluating the behavior of a ring foundation resting on multi-layered soil is one of the important issues facing civil engineers. Many researchers have studied the behavior of ring foundation rests on multi-layered soil with vertical loads acting on the foundation. In real life ring foundation can be subjected to both vertical and horizontal loads at the same time due to wind or the presence of soil. In this research, the behavior of ring footing subjected to inclined load has been studied using PLAXIS software. Furthermore, the effect of multi-layered soil has been simulated in the model. The results showed that both vertical and horizontal stresses are mainly affected when the inclination angle of the load exceeded 45 degrees with a reduc
... Show MoreThe H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreIn this work, an explicit formula for a class of Bi-Bazilevic univalent functions involving differential operator is given, as well as the determination of upper bounds for the general Taylor-Maclaurin coefficient of a functions belong to this class, are established Faber polynomials are used as a coordinated system to study the geometry of the manifold of coefficients for these functions. Also determining bounds for the first two coefficients of such functions.
In certain cases, our initial estimates improve some of the coefficient bounds and link them to earlier thoughtful results that are published earlier.
Meaning letters in Arabic are characterized by the diversity and abundance of their linguistic material, and are also distinguished by their large number and types, to the point that some of them have reached a hundred letters confined to five categories
The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi