Preferred Language
Articles
/
jcoeduw-884
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured deterministicallyand then compared to
statistical expectations using a chi-square test.
In this paper the Run Criterion, is calculated, it can be calculated for any key generator
before it be implemented or constructed (software or hardware).The cryptosystems: Linear,
Product and Brüer are chosen as study cases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 23 2023
Journal Name
Arab Science Heritage Journal
العمق الوجداني والانفعال العاطفي لدى شعراء القرنين السابع والثامن الهجريين في الأندلس
...Show More Authors

 The Andalusi did not leave any poetic art without expressing his psychological and sentimental emotions and the depth of emotions and it sincerity. We found Andalusian translated his emotions into poetry and in many different subjects. The Poetic images and the analogies were plentiful in their poetry.

View Publication Preview PDF
Publication Date
Wed Sep 25 2019
Journal Name
Journal Of The College Of Education For Women
آليات التواصل اللغوية والبلاغية في الخطاب القرآني سور الطّور والنّجم والقمر إنموذجاً
...Show More Authors

    لما كانت الوظيفة الأساسية للغة هي الوظيفة التواصلية ، أو التبادل الكلامي بين المخاطب والمستمع ، فكان لا بد لهذه الوظيفة من آليات – لغوية وبلاغية – يستعملها المتكلم أو المرسل للخطاب الأدبي لتوجيه ذهن السامع أو المخاطب نحو ما يطرحه من أفكار ، ورؤى ، واقناعه عن طريق التواصل ، بمضمون الخطاب واستلزام سرعة الانجاز ، وتأسيساً على ذلك جاء هذا البحث لبيان هذه الآليات في الخطاب القرآني متمثلاً في سور الطور

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
المكانة الاجتماعية لطفل الروضة بين اقرانه وعلاقتها ببعض المتغيرات في مدينة بغداد
...Show More Authors

استهدف البحث الكشف عن المكانة الاجتماعية لطفل الروضة بين أقرانه ، ودلالة الفروق في المكانة الاجتماعية لاطفال عينة البحث التي تعزي الى بعض المتغيرات من خلال الاجابة عن الاسئلة الاتية :

اولاً : ما المكانة الاجتماعية لدى اطفال الروضة بين اقرانهم ؟

ثانياً : ما علاقة المكانة الاجتماعية لدى اطفال الروضة ببعض المتغيرات و ذلك من خلال اختبار الفرضيات الصفرية الآتية :

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
امكانية تطبيق نظام الموازنة على اساس النشاط ABB في مديرية بلديات بابل
...Show More Authors

Under major developments in the field of business environment, the use of traditional budgets do not fit into these developments and adversely affect the future performance of the enterprises, which requires the transition to modern systems in the preparation of the budgets of activity based budgeting ABB because they provide a more accurate and objective estimates based on scientific foundations and practical avoided arising from the use of traditional budgeting problems, Where ABB is working better allocation of resources based on the activities of an enterprise and this positively affects the performance of the administration for the purpose of evaluating their performance according to responsibility centers and decision-making govern

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
مدى معرفة المرأة بمعلومات البطاقة الارشادیة المرفقة بالملابس والمفروشات في مدینة بغداد
...Show More Authors

It takes a long time and a lot of money to choose and provide clothes. It is soothing
necessary to care of them in order to use it another time. There is no Disposable clothes
until now, like other things in the house which we used for once then we dropped, then we
can use new one without any time or effort can be mentioned like needles, nappy, tissues
and etc.
The clothes are different; people should take care of and clean them again in order to
use them again. The right care of clothes would make them last for a long time. So, there is
no need to buy a new one instead of them in a short time. This thing provides time and
effort for the people and the family, to affect positively on the family’s budget.
We s

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
مجلة نسق
اثر استراتيجية القوائم المركزة في تحصيل مادة الكيمياء طلاب الصف الثاني المتوسط
...Show More Authors

يهدف البحث التعرف على اثر استراتيجية القوائم المركزة في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسط وتم استخدام المنهد التجريبي ذو الضبط الجزئي وكذلك تم اختيار مجامع البحث جميع طلاب المدارس الثانوية والمتوسطة التابعة لمديرية تربية كربلاء

Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An evaluation of waste and well water quality for agriculture production around Erbil city, Iraq
...Show More Authors

Erbil city is located in the northern Iraq with a population of over one million people. Due to water crises farmers usually use wastewater and well water for the agricultural production. In this study six stations were designed to sample waste water and three from well water to define waste water and ground water characteristics. In this study, Residual Na+ Carbonate, Mg++ hazard, salinity hazard, Kelley index, %sodium, total hardness, permeability index, potential salinity, sodium adsorption ratio, and Irrigation Water Quality Index (IWQI) were determined. The order of average cation concentrations in water was Mg2+> Ca2+ > Na+ > K+. While the proportion of main

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
An Investigation of Corona Domination Number for Some Special Graphs and Jahangir Graph
...Show More Authors

In this work,  the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Correlation Expression between P52 and BCL2 among Iraqi Women with Breast Carcinoma
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref