The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations. This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm. The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2. Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard. This means the Differential cryptanalysis cannot be performed on the cipher-text.
South Sudan is known by its tribal and racial variation .Tribal Perception represents the
procedure of dealings in Southern society .And that what make Sudan as a stable country that
suffer from divisions . Everybody wants to rule in spite of his inability and un qualification
which enables the establishment of an urbanized country .the frustration of the state in
handling the interior variety on religious, tribal and racial basis and contracting national
ideality in spared by shared ingredients between gathered groups in one state, all these reasons
make it hard to create a united national identity which is able to unite atheist and religious
parties together. Due to this ,the study is established to clarify the nat
This study focused on benthic algae (epipelic and attached algae on concrete lining stream) in Bani-Hassan stream in Holly Karbala, Iraq. The qualitative and quantitative studies of benthic algae were done by collecting 240 samples from five sites in the study area for the period from December 2012 to November 2013. Also, the environmental variables of the stream were examined in term of temporary and spatial. The results showed that the stream was alkaline, hard, oligohaline and a well aerated. The total nitrogen to the total phosphorus (TN: TP) ratio indicates nitrogen limitation. 129 species of benthic algae belonging to 57 genera were identified. Bacillariophyceae (diatoms) was the predominant taxon (95 species) followed by Chlorophyce
... Show MoreThis century is witnessing changes in various fields,which have become a challenge to the enterprises in the contemporary business environment, the most important of which is the importance of measurement and disclosure of the role of knowledge capital in the transition to the knowledge economy, which is no longer the land and labor and physical capital resources the basic. Knowledge-based capital has emerged that provides the enterprise with an area of excellence and enhances its position to achieve competitive advantage. The research tackled the concept, objectives, components and importance of knowledge capital, which is fundamental in knowledge management, creating value added and enhancing competitiveness, as well as an
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show Moreأثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ
... Show MoreThe distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show More