Preferred Language
Articles
/
bsj-7315
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Optimization of Surface Roughness for Al-alloy in Electro-chemical Machining (ECM) using Taguchi Method
...Show More Authors

Electro-chemical Machining is  significant  process to remove metal with using  anodic dissolution. Electro-chemical machining use to removed metal workpiece from (7025) aluminum alloy using Potassium chloride (KCl) solution .The tool used was made from copper. In this present the optimize processes input parameter use are( current, gap and electrolyte concentration) and surface roughness (Ra) as output .The experiments on electro-chemical machining with use current (30, 50, 70)A, gap (1.00, 1.25, 1.50) mm and electrolyte concentration (100, 200, 300) (g/L).  The method (ANOVA) was used to limited the large influence factors affected on surface roughness and found the current was the large influence f

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 27 2025
Journal Name
Journal Of Physical Education
The Effect of Proposed Exercises On Some Kinematical Variables Of Rotational Back Kick In Taekwondo Fighters Aged 15 – 17 Years Old
...Show More Authors

View Publication
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Effect of Velocity on Dissolved Oxygen Cathodic Polarization using a Rotating Cylinder Electrode
...Show More Authors

The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality
...Show More Authors

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Ultrafiltration and Reverse Osmosis Membranes for Treating Wastewater Effluent from Gas Turbine Power Plants using the Statistical Method of Taguchi
...Show More Authors

A study on the treatment and reuse of oily wastewater generated from the process of fuel oil treatment of gas turbine power plant was performed. The feasibility of using hollow fiber ultrafiltration (UF) membrane and reverse osmosis (RO) membrane type polyamide thin-film composite in a pilot plant was investigated. Three different variables: pressure (0.5, 1, 1.5 and 2 bars), oil content (10, 20, 30 and 40 ppm), and temperature (15, 20, 30 and 40 ᵒC) were employed in the UF process while TDS was kept constant at 150 ppm. Four different variables: pressure (5, 6, 7 and 8 bar), oil content (2.5, 5, 7.5 and 10 ppm), total dissolved solids (TDS) (100, 200,300 and 400 ppm), and temperature (15, 20, 30 and 40 ᵒC) were mani

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
Https://www.researchgate.net/journal/international-journal-of-science-and-research-ijsr-2319-7064
Evaluation of Water Quality using Bhargava Water Quality Index Method and GIS, Case Study: Euphrates River in Al-Najaf City
...Show More Authors

ENGLISH

Crossref (2)
Crossref
Publication Date
Fri May 01 2015
Journal Name
Ieee Transactions On Microwave Theory And Techniques
On the Design of Gyroelectric Resonators and Circulators Using a Magnetically Biased 2-D Electron Gas (2-DEG)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref