أنزل ألله تعالى كتابه العزيز على رسوله محمد(ص) هداية للناس كافة وإنقاذا لهم من الكفر والشرك والضلال ، فبين لهم فيه أمور دينهم ودنياهم وميز لهم الحرام من الحلال ، وقصَ عليهم أخبار بعض الأمم السالفة قبلهم وما نزل بهم من عقاب جزاء
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThis study was aimed to develop an optimized Dy determination method using differential pulse voltammetry (DPV). The Plackett-Burman (PB) experimental design was used to select significant factors that affect the electrical current response, which were further optimized using the response surface method-central composite design (RSM-CCD). The type of electrolyte solution and amplitude modulation were found as two most significant factors, among the nine factors tested, which enhance the current response based on PB design. Further optimization using RSM-CCD shows that the optimum values for the tw
... Show Mores The study aims to identify the fairness in the distribution of municipal services between municipal districts and areas, from point of view of municipal chamber staff and from the point of view of the citizen. It also aims to identify factors affecting the fairness of the distribution of municipal services. Municipal services were being studied : hygiene and waste, water supply, sewer, creating gardens, and street paving .Factors which examined its impact on municipal services are: resources available to municipal chamber, the managerial process at municipal chamber, and factors in the external environment surrounding municipal chamber.The results of the study showed that level of the e
... Show MoreJob stress is considered one of the most important obstacles that may appear in the work field. In order to deal with the obstacles and challenges , the idea to deal with job stress has come to address job stress as one of the most important trends that enable organizations to face those challenges through focusing on the role of job stress and the organizational climate of the organization.
The research deals with two variables: the job stress as an independent variable, and the organizational climate as a dependent one. Each variable includes five sub-dimensions. These dimensions have been involved in an interaction to form
... Show MoreThis study was designed to show the inhibitory effect of different concentrations of alcoholic extract of Borage officinalis on the Monoamine oxidase (MAO) and Acetylcholinesterase (AChE) enzymes in human serum. The results obtained from the study exhibited that alcoholic extract of Borage officinalis caused inhibition to enzymes activity with all concentrations of the extract. The results also showed that when the concentration of the extract was (0.001 mg/ml), the percentage of inhibition was (4.3% with MAO and 15.2% with AChE) and this percentage increases until reaching up to (74.7% with MAO and 84.18% with AChE) when the concentration of the extract was (0.1 mg/ml). From the kinetic parameters, studies found that alcoholic extract o
... Show MoreMosquitoes like Culex quinquefasciatus are the primary vector that transmits many causes of diseases such as filariasis, Japanese encephalitis, and West Nile virus, in many countries around the world. The development in the scientific fields, such as nanotechnology, leads to use this technique in control programs of insects including mosquitoes through the use of green synthesis of nanoemulsions based on plant products such as castor oil. Castor oil nanoemulsion was formulated in various ratios comprising of castor oil, ethanol, tween 80, and deionized water by ultrasonication. Thermodynamic assay improved that the formula of (10 ml) of castor oil, ethanol (5ml), tween 80 (14 ml) and deionized water (71ml) was mor
... Show MoreThe banking performance and deposits attraction are considered to be of great importance in banks management, also the banking performance is one of the indications that measure the ability of satisfying and full fill the banks goals and the range of approach and move away from those goals, Also there are some important factors that affects on deposits, such as financial performance ,The aim of the research is to measure and analyses the banking performance and showing its effective impact and its relation in attracting deposits.
For the satisfaction of the research goals a smple was selected from the Iraqi banks which represented in five private banks were their data been analyzed between the periods 2009 to 2013 ,th
... Show More|
Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so . During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th |
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More