Preferred Language
Articles
/
bsj-7315
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Structural and optical properties of CdS:Sn thin films prepared by chemical spray pyrolysis method
...Show More Authors

CdS and CdS:Sn thin films were successfully deposited on glass
substrates by spray pyrolysis method. The films were grown at
substrate temperatures 300 C°. The effects of Sn concentration on the
structural and optical properties were studied.
The XRD profiles showed that the films are polycrystalline with
hexagonal structure grown preferentially along the (002) axis. The
optical studies exhibit direct allowed transition. Energy band gap
vary from 3.2 to 2.7 eV.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 05 2022
Journal Name
Nano Hybrids And Composites
Structural and Optical Properties of ZnO Nanostructures Synthesized by Hydrothermal Method at Different Conditions
...Show More Authors

ZnO nanostructures were synthesized by hydrothermal method at different temperatures and growth times. The effect of increasing the temperature on structural and optical properties of ZnO were analyzed and discussed. The prepared ZnO nanostructures were characterized by X-ray diffraction (XRD), UV–Vis. absorption spectroscopy (UV–Vis.), Photoluminescence (PL), and scanning electron microscopy (SEM). In this work, hexagonal crystal structure prepared ZnO nanostructures was observed using X-ray diffraction (XRD) and the average crystallite size equal 14.7 and 23.8 nm for samples synthesized at growth time 7 and 8 hours respectively. A nanotubes-shaped surface morphology was found using scanning electron microscopy (SEM). The optic

... Show More
View Publication
Crossref (4)
Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Extraction and mass transfer study of Cupressus sempervirens L. oil by hydro-distillation method
...Show More Authors

The extraction of Cupressus sempervirens L. or cypress essential oil was studied in this paper. This cypress oil was extracted by using the hydro-distillation method, using a clevenger apparatus. Cupressus sempervirens L. leaves were collected from Hit city in Al-Anbar province – Iraq. The influences of three important parameters on the process of oil extraction; water which used as a solvent to the solid ratio (5:1 and 14:1 (ml solvent/g plant), temperature (30 to 100 °C) and processing time, were examined to obtain the best processing conditions to achieve the maximum yield of the essential oil. Also, the mathematical model was described to calculate the mass transfer coefficient. Therefore, the best conditions, that were obtained in

... Show More
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
The Effect Of Flexible Grouping Strategy And Three Step Interview Strategy On Achievement Of The History Material Among Student Of The First Intermediate Class
...Show More Authors

  The research aims to know The Effect Of Flexible Grouping Strategy  and Three Step Interview strategy on achievement of the history material among student of the first literary class, The Researcher used the experimental design of the two experimental groups and the control group and with post test, researcher group (a) represent the experimental group taught according the Flexible Grouping Strategy  , and Division (c) to represent the second experimental group which studied according Three Step Interview strategy and Division (b ) to represent the control group taught in the traditional method, the number of students (99) students of (33) female students in each division. T

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 25 2018
Journal Name
Oriental Journal Of Chemistry
Advancement and Validation of new Derivatives Spectrophotometric Method for Individual and Simultaneous Estimation of Diclofenac Sodium and Nicotinamide
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal audit of spending units and its impact on the efficiency of the federal budget
...Show More Authors

The role of internal control is based on the effectiveness of the budget through an analysis of the reality of the budget in the research sample as it was studied in the preparation and preparation stages and the implementation stage. The sample showed that the sample did not comply with what is stated in the Ministry of Finance publication of instructions and ceilings. In the process of preparing and resulting from the occurrence of deviations in large proportions both in the discussion of the Ministry of Finance or when implementation as a low rate of implementation and the absence of allocations for some items, although there is a need for them as well as the transfer of large proportions of transfers both up or down and the purpose o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adoption of the IFRS11 Financial Reporting Standard for Oil Service Contracts Costs and its Reflection on Measurement and Disclosure for National Oil Companies: بحث تطبيق في شركة نفط ميسان (ش . ع)
...Show More Authors

The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th

... Show More
View Publication Preview PDF