In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
This study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.
The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.
After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreThis research addresses the employment of public relations for foreign oil corporate social responsibility programs operating in Iraq. It is a study of the programmes of six petroleum companies operating in Basra Governorate, which were selected for research as the highest production of Iraqi oil, as well as its enjoyment of strategic oil stores in Iraq.It contains the largest oil fields operatedby major international companies. This study aims at a number of objectives, notably the following:1)Recognize the most prominent corporate social responsibility projects and initiatives the companies have introduced to the local public.2)Investigate the extent to which the Iraqi publ
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3)
... Show MoreThe work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4- chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compo
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreThe added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).
The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi
... Show More