Preferred Language
Articles
/
ExeSh5IBVTCNdQwCdbNb
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more efficiently and productively. The results of the cipher/decipher analysis, 15 NIST test, comparison between proposal FLED and original LED based on the results of correlation coefficient (CC)and Cosine Similarity (CS), execution time, and throughputs showed that the proposed FLED has faster cipher and more productive than the original LED; it is also more secure than the original LED.

Scopus Crossref
View Publication
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF TRAINING BASED UPON MERITS IN IMPROVING THE EMPLOYEES PERFORMANCE AT THE JORDANIAN UNIVERSITY HOSPITALS Abstract
...Show More Authors

The study aims to identify the impact of competency-based training in its dimensions (skills, cognitive abilities, attitudes, and attitudes) in improving the performance of employees (achievement, strategic thinking and problem solving) in Jordanian university hospitals.

The study based on analytical descriptive method. The study population consisted of the Jordanian University Hospitals, the University Hospital of Jordan and the King Abdullah Hospital, as applied study case. The sample of the study consists of all upper and middle administrative employees of these hospitals; questionnaire distributed all of them and the number of valid questionnaires for analysis were 182 questionnaire.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Sustainability
Sustainable Utilization of Machine-Vision-Technique-Based Algorithm in Objective Evaluation of Confocal Microscope Images
...Show More Authors

Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Sport Sciences
Relationship of some components of blood immune fast transition to the handball players
...Show More Authors

It research and descriptive sample of players Handball number (21) player (Club Husseiniya) The research aims to identify the relationship between certain components of blood and immunological speed the transition has been a test speed the transition in addition to the withdrawal of a blood sample after (5-10) minutes on the test to identify the nature of the correlation between speed and some transitional immune blood Mkonaght. The importance of research in identifying the relationship element speed in the game where one of the key elements in this game and some blood components immune where there is little of the studies, which focused on the nature of the relationship between exercise and immune blood, especially in a game of handball, e

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Human Sport And Exercise - 2020 - Winter Conferences Of Sports Science
Test design to measure the cognitive processing speed of table tennis players
...Show More Authors

Table tennis is considered one of the fast base sports that the player needs to have the speed of performance and awareness, especially in straight forward and back strikes, which is an important offensive skills, and the player success depends on his perception speed to the point of the fall of the ball in the arena of his competitor. But there is no way to measure cognitive processing speed. Therefore, the researchers sought to design a test that measures this ability to ensure its scientific evaluation, and then establish standard scores for this test for the players of the specialized school of table tennis, to help evaluate them objectively and move away from subjective estimates when evaluating and developing measuring instruments in

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Linear Increasing in Radial Electronic Density Distribution for K and L Shells throughout Some Be-Like Ions
...Show More Authors

Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Journal Of The College Of Education For Women
The Effect of Dictogloss Technique on University EFL Students' Collocation Knowledge
...Show More Authors

تتمثل مشكلة الدراسة في الصعوبات التي يواجهها طلاب اللغة الإنجليزية كلغة أجنبية في تعلم وإتقان المتلازمات اللفظية. تهدف هذا الدراسة تهدف إلى تحديد أثر استخدام تقنية المسرد الاملائي على معرفة المتلازمات اللفظية لدى الطلاب. ولتحقيق أهداف هذا البحث والتحقق من فرضياته تم اختيار عينة عشوائية مكونة من (60) طالبة من كلية اللغة الإنجليزية للسنة الثانية باستخدام كتاب الفهم القرائي المقرر للمستوى الثاني في قسم الل

... Show More
View Publication
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Use of model sales man fuzzy multi-objective linear for speed up and rationing in the transport mechanism used in the General Company for grain Processing
...Show More Authors

     Applications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref