The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
Significant advances in horizontal well drilling technology have been made in recent years. The conventional productivity equations for single phase flowing at steady state conditions have been used and solved using Microsoft Excel for various reservoir properties and different horizontal well lengths.
The deviation between the actual field data, and that obtained by the software based on conventional equations have been adjusted to introduce some parameters inserted in the conventional equation.
The new formula for calculating flow efficiency was derived and applied with the best proposed values of coefficients ψ=0.7 and ω= 1.4. The simulated results fitted the field data.
Various reservoir and field parameters including late
Two compounds,[2-amino-4-(4-nitro phenyl) 1,3-thiazole],(4) and [2-amino-4-(4-bromo phenyl) 1,3-thiazole],(5), were synthesized by refluxing thiourea (1) with each of para-ntiro and para-bomophanacyl bromides(2) and (3) respectively, in absolute methanol. Then, by reaction of [5] with 3,5-dinitrobenzoyl chloride in dimethylformamide (DMF) yielded (6) .On the other hand, reaction of (4) with chloroacetyl chloride in dry benzene afforded (7), which is upon treatment with thiourea in absolute methanol, af
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreA new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag
... Show MoreThis study includes a detailed morphological description of Cosmina baghdadensis sp. nov.
from Iraq.
Many characters are used in identification especially chaetotaxy and male genetalia.
Locality, host plant, and data of collection were given.
The present study aims to explore determinants of entrepreneurial behavior from perspective of social theory. It is based on model notions of (Tyler & Blader, 2003) which have focused on studying role of positively personal and social identity in motivating employees to practicing desired behavior which serves the organization in which they work. Based on these notions and previous literature, study model were built. This model explains the relationship between status judgments (perceived internal respect and perceived external prestige) and entrepreneurial behavior. It includes three main hypotheses. The first and second hypothesis are concerning the relationship between status judgmen
... Show MoreThe arrival of Russian President Vladimir Putin to power in the Russian Federation is an important factor in delineating a new approach to Russian policy towards regions that have great strategic importance affecting its national security. Therefore, NATO's progress eastward towards these regions prompts Russia to delineate a new strategy to confront this progress as well as preserving its control in the near neighboring regions represented by the countries of Eastern Europe, especially after the changes that occurred in those regions following the color revolutions that swept the region, such as the first application of this Russian policy in 2014, through the annexation of Crimea, and the latest military operations in Ukraine i
... Show MoreNotes are given regarding new record species of the braconid parasite short note in Iraq. That is Apanteles angalcti it is found to parasitize early larval instaxs of Ectomyslois ceratontae, one of the most serious pests of pomegra- nate fruit.