Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.
the model was estimated on simulati
... Show MoreBackground: Pilonidal sinus is a recurrence pathology that affects the gluteal area, cleft part of it. It affects many parts but mainly the sacral area and may present with various forms; from the asymptomatic cyst to severe infection in a form of painful abscess or sinus. The treatment of pilonidal sinus ranges from observation with good hygiene to excision of the sinus left wide incision. Recurrence may follow the excisional procedure and may need more operations. Many conservative ways had been used for the management of the sinus; laser (phototherapy) is one kind that may use. this paper aims to test the efficiency of the laser (diode 980nm) in the treatment of the sinus. material:
... Show MoreThis research highlights the light on the general framework of accounting discloser in the Islamic banks, and show the types and the concepts of Cost Efficiency, In this present study, the sample included Fourteen Islamic banks, where the data was collected from the annual financial reports. Accordingly, the study in order to achieve the aims and access to the results based on the analytical method and the descriptive analysis, and conducted a Simple & Multiple Linear Regression analysis, in order to test hypotheses of the research by using of statistical analysis software (SPSS). The research has arrived to many results such as: the commitment of Islamic banks working in the Kingdome of Bahrain (Wholesale) to the requirements of the
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreNosocomial infection is acquired contamination of hospitals and health care units caused by multidrug resistant bacteria. Currently, bacterial resistance to antimicrobial medication represents a complicated public health problem. Recent studies on the antimicrobial activity of silver nanoparticles (AgNPs) attracted researchers worldwide to focus on the safe synthesis of AgNPs as antimicrobial agents against multidrug resistant bacteria. The antimicrobial efficacy of AgNPs on pathogenic bacteria isolated from clinical cases of acquired hospital infection was targeted in this project. Fifty specimens of stool were collected through private laboratories in Baghdad from patients who suffered diarrheal symptoms. Bacterial isolation, identific
... Show MoreThis study aimed to evaluate oral health (OH) and periodontal diseases (PD) awareness in the Iraqi population.
This study was a questionnaire‐based online survey of two weeks duration. The questionnaire was built using a Google platform and was distributed randomly via social media (Facebook and Telegram). The questionnaire consisted of a demographic data section and two other main sections for the evaluation of OH and PD awareness. Each response was marked with “1” for a positive answer and “0” for the other answers. For each respondent, answers were summed to give
In the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,
Natural fibers and particles reinforced composites are being broadly used due to their bio and specific properties such as low density and easy to machine and production with low cost. In this work, water absorption and mechanical properties such as tensile strength, flexural strength and impact strength of recycled jute fibers reinforced epoxy resin were enhanced by treating these fibers with alkaline solution. The recycled jute fibers were treated with different concentration of (NaOH) solution at (25 0C) for a period of (24) hours. From the obtained results, it was found that all these properties are improved when fibers treated with (7.5wt% NaOH) related to untreated fibers. Conversely, the mentioned properties of composit
... Show More