Preferred Language
Articles
/
ijs-7815
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Applied Mechanics And Materials
Artistic Techniques for Developing Creativity in Design
...Show More Authors

The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The reality of religious tourism publications design and ways of developing The upper threshold model: صادق هاشم حسن الموسوي
...Show More Authors

Tourism is one of the most important sources of income of economic key countries in the world so are imports of tourism for some countries a source of income is not significant of the total revenues of States. Making those countries, and those countries a destination for visitors, and here should be interest in the Wealth and cultural heritage that distinguishes Islamic countries in general, and Iraq in particular, must be placed specialist studies in all areas for the development of this area of tourism, especially religious tourism to achieve a desired and desired of such research.It is the most important ways to develop tourism in general and religious tourism is of particular publications, advertising, and is important for us in this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic Algorithm and Particle Swarm Optimization Techniques for Solving Multi-Objectives on Single Machine Scheduling Problem
...Show More Authors

In this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as  (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Using the Basic Efficiency Criteria to Estimate the Security of the New Digital Algebraic Generator System (NDAGS)
...Show More Authors

The Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).

View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The impact of complexity management on dynamic capabilities: a survey at some private colleges
...Show More Authors

 

This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges.  Private colleges are currently facing many crises, changes, unrest and high competitive pressures.  Which is sometimes difficult or even impossible to predict.  The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive.  Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 15 2018
Journal Name
Journal Of Mathematical Imaging And Vision
A New Hybrid form of Krawtchouk and Tchebichef Polynomials: Design and Application
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Simplicity and complexity in the visual layout of the designs Children magazine covers
...Show More Authors

The magazine covers the subjects of (simplicity and complexity in the visual layout of the designs of magazine coverings of children) Chapter I The problem and importance of the goal and limits of research and addition to Terminology. In the second chapter the theoretical framework in which the first topic the role of simplicity and complexity in the design and the second section Visual design and design relations and the third research design in magazine covers and the third chapter includes the methodology of research and analysis and the results and conclusions and sources and the most important result of the research is (simplicity and complexity of design, Continuity and vitality and attract the attention of the receiver through the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
NUMERICAL INVESTIGATION OF DEVELOPING LAMINAR FLUID FLOW THROUGH RECTANGULAR ANNULUS DUCT
...Show More Authors

The laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.

View Publication
Crossref