The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThis paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreThis study aims to determine the impact of organization values as an independent variable across its dimensions (organization management values, organization mission values, relations management values, and environment management values) on achieve the strategic success which is the dependent variable and include its dimensions (environmental analysis, creative thinking, strategic decision, effective implementation, and leadership capacities). The study is conducted in the Iraq Oil Ministry. It deployed the analytical descriptive approach. It focuses on the study problem enquiries throughout addressing several principal and sub-hypothesizes in regards to cause and effect relationship. To achieve this result
... Show MoreThe responsibility of the Central Bank through the implementation of its monetary policy to maintain the integrity and stability of the financial system and the economic system, because any shock, whether internal or external, may endanger the financial system and instability, so the research sheds light on the effectiveness of monetary policy in maintaining financial stability, The most important conclusion is that there is an increase in capital, which gives banks the possibility to face the risks to which they are exposed, as well as a rise in the total bad debts, which weakens its financial position, which constitutes a decline in the financial stability of these banks.
The research includes studying melodic and rhythmic properties, In the audio format for Iraqi musicians. The audio form is one of the important methodological forms in Arab music in general and Iraqi music in particular. It showcases its characteristics, features, internal form, and how important it is in Iraqi music.
Addressed ((the systematic framework)) presenting the research problem and the need for it. Its importance, purpose and limitations of its research, which included music ((Khaled Muhammad Ali)) as a human limit to reveal its characteristics in the composition of the audio form. And define the terms included in the research. And included ((theoretical framework)) on three topics .. The first: composing. The second
The place and environment in which the artist lives is considered one of the influences and drivers active in him, thus determining his style and artistic direction later, and in our research we have dealt with the effect of place and environment in the drawings of Nuri al-Rawi and the extent of their reflection on the general, so the research came within two frameworks: The first is the methodological framework that represents We have the problem of the research, its importance, its goal and the limits of research in it in addition to defining terms. As for the theoretical framework, the study dealt with two topics, the first of which included the topic (Nuri the narrator, the environment and the place) dealing with the role and effect
... Show MoreSummarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla
... Show MoreQuality is the key to success in today's world, which is based mainly on competition in the provision of high quality services through the application of the modern management method which is called total quality management in organizations. This includes describing the provision of health services and satisfaction of patients . .  
... Show More