Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.
The study was conducted to estimate the economic losses caused by insect mole cricket Gryllotalpa gryllotalpa on some agricultural crops and Potato tubers in collage of Agriculture- Abu Ghraib season 2012-2013. Study showed Mole cricket caused percentage of infestation in spring potato tubers variety Luciana reached to 11.61% and the percentage of loss in weight of tubers reached 18.88%. The study showed that addition of animal manure (organic fertilizer) to the soil when planting potatoes in the autumn increased the incidence of infestation and the number of tunnels caused by mole cricket which led to from increased economic losses. When matured potato tubers were left for a longer period in the soil percentage of infestation by mole cr
... Show MoreThis paper presents seven modified Adomian Decomposition Method (ADM) techniques for efficiently solving initial value problems, especially those involving non-homogeneous and nonlinear differential equations. While the classical ADM is effective for linear homogeneous cases, it has difficulties solving more complex problems. The proposed modifications—from MADM1 to MLADM—include Maclaurin and Taylor expansions, Laplace transforms, and single-step iterations.• These modifications enhance convergence, reduce complexity, and improve accuracy.• Each method offers specific advantages, such as accelerating convergence (MADM2, RADM4), simplifying computation (TSADM5), and achieving higher accuracy (MLADM).• Numerical examples confirm th
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn addition to its basic communicative function, language can be used to imply information that is not actually stated, i.e. addressers do not always state exactly (or directly) what they mean. Such instances fall within the domain of pragmatics in that they have to do with how addressers use language to communicate in a particular situation by implication rather than by direct statement. The researcher attempts to demonstrate that the beauty and the multiple layers of meaning in poetry can be better explored if the addressee looks at the lines from a pragmatic perspective in search for implied meaning. There are many devices that can convey implied meaning in poetry, among which are 'rhetorical', 'figurative' or 'literary' devices. But
... Show MoreThe research aims to achieve a set of objectives, the most important of which is to educate the management of companies operating in the private sector about the advantages and risks of using creative accounting practices, as on the one hand they serve the interests of the company and improve its image, and on the other hand it exposes it to the risks of non-compliance with tax laws and legislation or the risks of default and bankruptcy as a result of exploiting gaps and flexibility in the application Accounting standards, and in line with the objectives and through the research problem that was formulated in the form of a question (Are their creative accounting practices that are reflected in the honesty and fairness of financia
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreIn this paper, a miniaturized 2 × 2 electro-optic plasmonic Mach– Zehnder switch (MZS) based on metal–polymer–silicon hybrid waveguide is presented. Adiabatic tapers are designed to couple the light between the plasmonic phase shifter, implemented in each of the MZS arms, and the 3-dB input/output directional couplers. For 6 µm-long hybrid plasmonic waveguide supported by JRD1 polymer (r33= 390 pm/V), a π-phase shift voltage of 2 V is obtained. The switch is designed for 1550 nm operation wavelength using COMSOL software and characterizes by 2.3 dB insertion loss, 9.9 fJ/bit power consumption, and 640 GHz operation bandwidth