This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
Abstract
The use of modern scientific methods and techniques, is considered important topics to solve many of the problems which face some sector, including industrial, service and health. The researcher always intends to use modern methods characterized by accuracy, clarity and speed to reach the optimal solution and be easy at the same time in terms of understanding and application.
the research presented this comparison between the two methods of solution for linear fractional programming models which are linear transformation for Charnas & Cooper , and denominator function restriction method through applied on the oil heaters and gas cookers plant , where the show after reac
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAn Indirect simple sensitive and applicable spectrofluorometric method has been developed for the determination of Cefotaxime Sodium (CEF), ciprofloxacin Hydrochloride (CIP) and Famotidine (FAM) using reaction system bromate-bromide and acriflavine (AF) as fluorescent dye. The method is based on the oxidation of drugs with known excess bromate-bromide mixture in acidic medium and subsequent determination of unreacted oxidant by quenching fluorescence of AF. Fluorescence intensity of residual AF was measured at 528 nm after excitation at 402 nm. The fluorescence-concentration plots were rectilinear over the ranges 0.1-3.0, 0.05-2.6 and 0.1-3.8 µg ml-1 with lower detection limits of 0.013, 0.018 and 0.021 µg ml-1 an
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
A Multiple System Biometric System Based on ECG Data
Geotechnical soil problems underneath foundation of hydraulic structures occurs due to engineering soil properties, geological setting and hydraulic properties of the projects. Two finite element programs of Geoslope 2012 software, SIGMA/W and SEEP/W, were used for analysis of in situ stresses, load deformation behavior, seepage quantity and vertical gradient below Teeb weir foundation, to compute factors of safety against seepage uplift. The site soil is a granular (gravel, sand and silt), weakly cemented soil cohered by gypsum and clay materials. The area has low lying topography, with slightly tectonic activities. The model results show that the upstream side stresses are reduced while the pore pressure are in
... Show MoreThe exchange rate is of great importance at the global and local levels alike, as this importance increases with the increasing rates of development of economic relations between countries of the world due to openness and integration into the global economy, expressed by the expansion of the volume of trade and financial relations between countries. The Central Bank of Iraq has set the need to stabilize this price as a goal to reduce inflation rates and reduce them to the internationally accepted rates by using the foreign currency sale window to achieve a balance between the forces of supply and demand for foreign currency and to preserve the value of the Iraqi dinar. The research concluded that the central bank was It has a maj
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
As a result of the developments that occurred in technological and digital technologies, which had a fundamental role in changing the paths of science, including the sciences of communication and the art of design, especially since these developments were the result of the information revolution, which called for the need to find alternatives that contribute to organizing presentations of information and texts in accordance with the manufacture of constructive content to deliver A communication message for the recipient to achieve culture and communication together, as it has become necessary to employ technical and digital developments in organizing that information according to the rules and laws of design and producing newspapers asso
... Show More