Preferred Language
Articles
/
bsj-7315
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Complexity
Bayesian Regularized Neural Network Model Development for Predicting Daily Rainfall from Sea Level Pressure Data: Investigation on Solving Complex Hydrology Problem
...Show More Authors

Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay

... Show More
View Publication
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Acta Logistica
A business continuity-based framework for risk management in smart supply chains: a fuzzy multi-criteria decision-making approach
...Show More Authors

The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
طريقة مقترحة لإيجاد الحل الأساسي المقبول (الممكن) لمشكلة النقل
...Show More Authors

The evaluation process of transportation problem required finding basic feasible solution (bfs). Represent the base of decision making process. To purpose start anther batter solution to able from decisions taking process, consider the decision making process, find (bfs) represent the standard form in linear programming (LP). Most important stage of update (bsf) stages that achieved minimum cost (the optimal solution). the goal of paper to improving & evaluation (bfs) by new procedure (proposed method) comparison with Vogel method.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Maximum Likelihood and Bayesian Methods For Estimating The Gamma Regression With Practical Application
...Show More Authors

In this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Comparison between Ghassan Kanafani's Novel " Ma tabaqa lakom" and William Faulkner's "The Sound and the Fury" from the Perspective of the American School (the methodology of the novelistic theme and style): مقایسة دو رمان "ماتبقّي لكم"کنفانی و " خشم و هياهو"ی فاکنر بر اساس مكتب آمريكا (بررسی روش شناختی محتوایی و سبکی )
...Show More Authors

     Being the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury.  Within the perspective of the descriptive analysis approach, the present paper discusses th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Current Research In Microbiology And Biotechnology
Evaluation for the Cytotoxic Effect of Exotoxin A Produced by Pseudomonas aeruginosa on Mice by using Cytogenetic Parameters
...Show More Authors

This research was conduct to evaluate the cytotoxic effect of exotoxin A (ETA) produced by Pseudomonas aeruginosa on mice in comparison with (phosphate buffer saline (PBS) as a negative control. The effect of the toxin was measured by employing the cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs), micronucleus (MN) and sperm abnormalities) parameters. In order to specify the cytotoxic effect of the toxin, three doses of ETA (125, 250 and 500 ng/ml) were used. Results showed that ETA was found to cause a significant decrease in mitotic index (MI) percentage, while significant increase in micronucleus (MN), chromosomal aberrations (CAs) and sperm abnormalities parameters in compression with control wa

... Show More
Publication Date
Mon Jun 23 2025
Journal Name
Journal Of Craniofacial Surgery
Gender Determination in Forensic Dentistry Using Bonwill’s Triangle Measurements From CBCT Scans: A Study on the Iraqi Population
...Show More Authors
Background:

The purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.

Materials and methods:

In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De

... Show More
View Publication
Scopus Clarivate Crossref