The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
This study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k
There are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
Three new hydrazone derivatives of Etodolac were synthesized and evaluated for their anti-inflammatory activity by using egg white induced paw edema method. All the synthesized target compounds were characterized by CHN- microanalysis, FT-IR spectroscopy, and 1HNMR analysis. The synthesis of the target (P1-P3) compounds was accomplished following multistep reaction procedures. The synthesized target compounds were found to be active in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Etodolac).
New Schiff bases derived from D-galactose were synthesized by condensation of aldehyde (1,2:3,4-Di-O-isopropylidene-6-carboxaldehyde-α-D-galactopyranose) with different aromatic amines such as (4-bromo, 3-hydroxy, 4-iodo, 4-methoxy) aniline in dry benzene using glacial acetic acid as a catalyst. These compounds were converted to oxazepine derivatives by addition reaction with maleic anhydride in dry benzene as a solvent. The structures of the synthesized compounds have been characterized by elemental analysis, FTIR spectra, some of them by using 1HNMR spectra and measurement of its physical properties.
Based on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.
الخلاصة لقد شكل المحافظون الجدد وهم بالأساس نخبة من المثقفين ومن السياسيين الأمريكيين كتلة ضغط كبيرة التأثير على الإدارة في عهد الجمهوريين. حمل هؤلاء المحافظون مشروعاً إيديولوجياً البسوه لسلطة الجمهوريين وهو يهدف إلى جعل أمريكا سيدة العالم من دون منازع خاصة بعد انهيار الاتحاد السوفييتي ونهاية الحرب الباردة. واكب هذا الحدث التاريخي الكثير من الأفكار ومنها (نهاية التاريخ)، وصراع الحضارات، وكذ
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreIbuprofen is one of the most important members of NSAIDs, named aryl propionic acid derivative. Isatin (1H-indole-2,3-dione) is an important molecule of heterocyclic compounds that have many biological activities. This work illustrates the synthesis of new ibuprofen-isatin derivatives by connecting ibuprofen hydrazide with different isatin derivatives by a condensation reaction, followed by characterization by fourier-transform infrared spectroscopy (FTIR) and proton nuclear magnetic resonance (1H-NMR) spectroscopy. The anti-inflammatory activity was evaluated by using the egg-white induce edema method for all the synthesized compounds (5-8), the compounds 5 and 6 showed better anti-inflammatory activity than ibuprofen as a standard
... Show MoreA comparison study was made for the reaction of triruthenium carbonyl Ru3(CO)12 with azoarene ArN=NAr . This reaction was monitored in two kinds of solvents , toluene , and n- octane , which yielded new triruthenium carbonyl complex Ru3(μ3-NAr)2(CO)9 . The reactions of azoarenes ArN=NAr with Ru3(CO)12 formed the following trinuclear compound of Ru3((μ3- NAr)2(CO)9 (Ar-C6H4Br-4) in law yield . In addition , to new isomers species of mononuclear cyclometallated of Ru(BrC6H4N-NC6H4NBr-4)2(CO)2 in different percentages . The mechanism of the reaction domenstrates that the formation of trinuclear bis arylimido complexes , and ortho metallated was , the result of cleavage of nitrogen –nitrogen bond . Monitoring this gave evidence that the rea
... Show More