Preferred Language
Articles
/
bsj-7315
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
ستراتيجيات ردم الفجوة الرقمية في دول الاسكوا – مع إشارة خاصة للعراق-
...Show More Authors

إن التغيرات السريعة والبعيدة المدى في تكنولوجيا المعلومات القائمة على أساس الالكترونيات الدقيقة تساعد في حدوث تحول في صورة الاقتصاد العالمي، وكذلك تساعد في تغيير المزايا التنافسية للبلدان، وربط المؤسسات البعيدة ببعضها البعض، ونشر الخدمات المالية على نطاق عالمي، وكذلك إثارة مشكلات جديدة او العكس فتح فرص جديدة أمام تنمية ونمو أفقر البلدان .

وأدت هذه التكنولوجيا الجديد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Influence of Coating with Some Natural Based Materials on the Erosion Wear Behavior of Glass Fiber Reinforced Epoxy Resin
...Show More Authors

Abstract 

In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust  at 30cm , angle 60

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Class and its impact on society
...Show More Authors

Man has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Classification of Diseases in Oil Palm Leaves Using the GoogLeNet Model
...Show More Authors

The general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
The Effects of Vortex Generator Types on Heat Transfer and Flow Structure in a Rectangular Duct Flows
...Show More Authors

    In this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt n

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
A Pragmatic Analysis of Personal Deixes in Lyrical Poetry: Ezra Pound's Lyrics "Girl" and "A Virginal": رماح محي مجيد
...Show More Authors

Deixes belong to the field of both semantics and  pragmatics as they lie in the edge of these two fields. Pragmatically, they are concerned with the relationship between the structure of a language and the contexts. The present work aims at analyzing the use of deixes using Levinson’s (1983) and Yule's (1996) concept of deixes, where the latter maintained that the referents of the deixes cannot be realized apart from the context where they are used. He added that the contextual information of certain utterances involves information about the participants (the speaker and the addressee), the time and the place. Consequently, a qualitative- descriptive approach has been adopted to meet the objective of the study which reads, “exam

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of The World Federation Of Orthodontists
Validity and reliability of three-dimensional modeling of orthodontic dental casts using smartphone-based photogrammetric technology
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref