Preferred Language
Articles
/
bsj-5656
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Research In Medical And Dental Science
Efficacy of Several Forms of Storage Medium on Avulsed Teeth's Enamel Surface Roughness (An in Vitro Study)
...Show More Authors

Efficacy of Several Forms of Storage Medium on Avulsed Teeth's Enamel Surface Roughness (An in Vitro Study), Rawaa Sadiq Obeid1*, Muna Saleem Khalaf2

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Wipo
WO2016135512 - STEEL-CONCRETE COMPOSITE STRUCTURE
...Show More Authors

A steel-concrete composite structure (1) is described. The steel-concrete composite structure comprises a steel member (2) having an upper surface (5) and a plurality of shear connector elements (6) upstanding from the upper surface and a concrete slab (4) having upper and lower surfaces (7, 8). The slab is supported on its lower surface by the upper surface of the steel member. The slab comprises a plurality of through holes (9) between the upper and lower surfaces, each through hole tapering towards the lower surface so as to form an inverted frustally-shaped seating surface (10). The concrete slab is configured and positioned with respect to the steel member such that at least one shear connector element projects into each through hole.

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Structure and Melodic Sabean Mandaean
...Show More Authors

The Mandaean religion of ancient and important religions in Iraq and Iran has its own rituals which are characterized by the use of singing and toning of speech. It began with the creation of human beings through a group of prophets. Peace be upon them. Researcher research problem, and explained the importance of research and objectives and limits and identify terminology. The second topic is the theoretical framework to include the history of the Sabean Mandaean, secondly their religious rites, sources, major books and secondary books for the Latin tribes of Mandaean. Finally, the researcher tackled the sources of their sacred books and previous studies. The third topic represented the procedures. The researcher dealt with the musical a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Structure Social Group Attachment measure
...Show More Authors

This study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status?  The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Nuclear Structure Study of 188OS
...Show More Authors

The energy level scheme of 188Os has been established on the basis of
y-y coincidence measurements. Ge (Li) and HPGe detectors were
employed to study the gamma spectra produced in the -decay of 188Re to
188Os. Fourteen new transitions and four new levels at 1660, 1871, 1948
188and 2034 keV are suggested. Relative intensities from singles
measurements, branching ratios  and loft values were calculated and
multipolarities, spins and parities deduced

View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
The Attitudes of School Teachers and Principals at Regular Government Basic Schools toward Inclusion of Disabled Students in Ajloun Governorate
...Show More Authors

This study aimed to identify the attitudes of school teachers and principals at basic government schools in Ajloun governorate towards the inclusion of disabled students at basic schools, and investigate how they will accept the merger. To achieve the purpose of this study, a questionnaire containing 35 items was administered to school teachers and principals to measure their attitudes toward the inclusion of disabled students in regular schools. The sample of this study consisted of 43 male teachers and (74) female teachers and principals. The frequency, normal distribution, arithmetic means and t-test were used to analyze the data of present study.          The findings showed that there

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Estimating the general exponential distribution parameters using the simulation method
...Show More Authors

The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular, 

. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation  by using monte carlo simulation technique .. It was obse

... Show More
View Publication Preview PDF
Crossref