The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
This research included the preparation of 2-mercaptobenzoxazole (N1) by the reaction of ortho-aminophenol with carbon disulfide in an alcoholic potassium hydroxide solution. The 2-mercapto benzoxazole (N1) was then treated with hydrazine to obtain the 2-hydrazino benzoxazole (N2). A number of hydrazones (N3-N5) were prepared through the reaction of N2 with different benzaldehydes. The compound (N6) was also prepared whereby the ring closing of hydrazone (N3) using chloroacetylchloride, while the compound (N7) was prepared by treating 2-hydrazino benzoxazole with acetylacetone. When the compound (N1) was treated with formaldehyde, it afforded the compound (N8). Also, the N9 was obtained from the reaction of N1 with chloroacetic acid in th
... Show More2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti
... Show MoreThe research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both
The birth of Multiple Intelligence (MI) theory has revolutionized traditional education since the twentieth century. Howard Gardner, the pioneer of this theory, believed that each learner has a unique way of acquiring information. This paper investigates how the New Headway Plus for Upper-Intermediate-Third Edition, a standard EFL textbook in Iraqi universities, can cater to the diverse MI profiles of Iraqi EFL learners. It evaluates the success or failure of senior undergraduates in actively engaging with different learning styles and activities in the classroom. The study maps the distribution of nine distinct modes of MI theory across all 12 Units_ Logic/Mathematical, Verbal/Linguistic, Musical, Bodily/Kinesthetic, Visual/Spatial, Natura
... Show MoreDylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism. Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and the emotional involvement in the dynamics of life. In "Light Breaks
... Show MoreIn this study, chalcones were synthesis by condensing 2-acetylpyridine with aromatic aldehyde derivatives in dilute ethanolic potassium hydroxide solution at room temperature according to Claisen-Schmidt condensation. After that, new heterocyclic derivatives such as Oxazine, Thiazine and Pyrazol were synthesis by reaction between chalcones with urea, thiourea and hydrazine hydrate respectively scheme 1. All these compounds wrer characterization by FTIR, 1H-NMR spectroscopy and elemental analysis.
Density functional theory (DFT) calculations were used to evaluate the capability of Glutamine (Gln) and its derivative chemicals as inhibitors for the anti-corrosive behavior of iron. The current work is devoted to scrutinizing reactivity descriptors (both local and global) of Gln, two states of neutral and protonated. Also, the change of Gln upon the incorporation into dipeptides was investigated. Since the number of reaction centers has increased, an enhancement in dipeptides’ inhibitory effect was observed. Thus, the adsorption of small-scale peptides and glutamine amino acids on Fe surfaces (1 1 1) was performed, and characteristics such as adsorption energies and the configuration with the highest stability and lowest energy were ca
... Show MoreTHE ACTUAL SOCIETY MODEL
Our society model has been showing signs of exhaustion since the end of the XX century. The recent appearance of the Covid-19 virus is another consequence of humanity's distance from Nature and the environment it inhabits. Also, climate change, environmental deterioration, loss of biodiversity, overexploitation of natural resources, and social inequality are some of the consequences derived from this separation between society and Nature. We must change our operating habits. Inevitably from a society based on the market, hyper consumption, fossil energy and individual enrichment at all costs, we will have to change to another
... Show MoreAbstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.
Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show More