Preferred Language
Articles
/
EBYb9osBVTCNdQwCqueV
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circular queue in this work allows to encrypt each character of plaintext by one of cipher methods which controlled by control key for selection process. The scheduling of above cipher methods implementation depends on control key. The experiment results of the proposed hybrid text cryptography method shows ability to cipher and decipher an important data with effectively and efficiently. Utilizing the properties of different cipher methods that are scheduled in circular queue (Caesar, Vigenère, Affine, and Multiplicative) leads to consume time less than other methods when they used alone, so, the important concepts in cryptography process such as complexity, integrity, execution time and security are meet in the proposed hybrid text cryptography method in ef ective manner.

Publication Date
Fri Mar 01 2019
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
SOME TYPES OF DELAY DIFFERENTIAL EQUATIONS SOLVED BY SUMUDU TRANSFORM METHOD
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nanoscience
Synthesis and Spectroscopic Characterization of Platinum Nanoparticles by Plasma Jet Method
...Show More Authors

In this research, Argon gas was used to generate atmospheric plasma in the manufacture of platinum nanomaterials, to study the resultant plasma spectrum and to calculate the cellular toxicity of those manufactured nanomaterials. This research is keen on the generation of nonthermal atmospheric pressure plasma using aqueous platinum salts (H2PtCl6 6H2O) with different concentrations and exposure of cold plasma with a different time period used to produce platinum nanoparticles, to ensure typical preparation of nanoparticles. Visible UV and X-rays were performed for this purpose, and the diameter of the system probe was (1[Formula: see text]mm) with the Argon gas flow of

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (8)
Scopus
Publication Date
Tue Jul 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A DESCRIPTION STUDY OF TWO LOCAL FISH HIMRI CARASOBARBUS LUTEUS (Heckel, 1843)(CYPRINIFORMES: CYPRINIDAE) AND HISHNI LIZA ABU (Heckel, 1843) (MUGILOIDEI : MUGILIDAE) BY BONES STAINING METHOD
...Show More Authors

    Two local fish Himri Carasobarbus luteus (Heckel, 1843)  and Hishni Liza abu (Heckel, 1843) were stained with Alizarin Red and featured some anatomical qualities which cleared the difference of the muscular and skeletal fabric for each fish. Since clear Histologic differences appeared in these two species, it was intended from this study the possibility of adopting a diagnosis between local fish species by staining bones and tissues.

View Publication Preview PDF
Publication Date
Wed Apr 09 2014
Journal Name
Chemical And Process Engineering Research
Analytical Profile of 4 - (4-Nitro Benzene Azo) - 3 - Amino Benzoic Acid on a Surface of Natural Granulated Calcined Iraqi Montmorillonite Clay Mineral, via Columnar Method
...Show More Authors

The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb of 4-(4-Nitrobenzeneazo) 3-Aminobenzoic Acid from aqueous solutions has been investigated through columnar method. The azo dye adsorption found to be dependent on adsorbent dosage, initial concentration and contact time. All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.), at room temperature (25±2) °C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monolayer adsorption capacity is 6.4066 mg Azo ligand per 1g calcined Montmorillonite. The experiments showed that highest removal rate 90.5 % for azo dye at pH 5.5.The

... Show More
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 01 2025
Journal Name
Process Safety And Environmental Protection
Electromembrane extraction of Cadmium (II) using a novel design of electrochemical cell with a flat sheet supported liquid membrane
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The added value of the knowledge assets using a scale (VAIC) in a sample of the industrial sector companies
...Show More Authors

The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample

... Show More
View Publication Preview PDF
Crossref