The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circular queue in this work allows to encrypt each character of plaintext by one of cipher methods which controlled by control key for selection process. The scheduling of above cipher methods implementation depends on control key. The experiment results of the proposed hybrid text cryptography method shows ability to cipher and decipher an important data with effectively and efficiently. Utilizing the properties of different cipher methods that are scheduled in circular queue (Caesar, Vigenère, Affine, and Multiplicative) leads to consume time less than other methods when they used alone, so, the important concepts in cryptography process such as complexity, integrity, execution time and security are meet in the proposed hybrid text cryptography method in ef ective manner.
The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show MoreThis paper describes a number of new interleaving strategies based on the golden section. The new interleavers are called golden relative prime interleavers, golden interleavers, and dithered golden interleavers. The latter two approaches involve sorting a real-valued vector derived from the golden section. Random and so-called “spread” interleavers are also considered. Turbo-code performance results are presented and compared for the various interleaving strategies. Of the interleavers considered, the dithered golden interleaver typically provides the best performance, especially for low code rates and large block sizes. The golden relative prime interleaver is shown to work surprisingly well for high puncture rates. These interleav
... Show MoreIn this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.
This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The CdS quantum dots were prepared by chemical reaction
of cadmium oleylamine (Cd –oleylamine complex) with the
sulfite-oleylamine (S-oleylamine) with 1:6 mole ratios. The
optical properties structure and spectroscopy of the product
quantum dot were studied. The results show the dependence of the
optical properties on the crystal dimension and the formation of
the trap states in the energy band gap.
The current study aimed at (identifying the impact of a proposed strategy based on the realistic mathematics theory in the mathematical interrelation among the third intermediate grade students), two samples from the third intermediate grade were tested in a school affiliated to Rusafa I General education Directorate in Baghdad for the academic year (2022-2021)the experimental group will study according to the proposed strategy and it consisted of (30) female students , the control group will study through the traditional method and the number of its students is (30), thus the study sample consisted of (60) female students, the two groups were equalized in the variables (age in months, intelligence, prior knowledge) and to achieve the study
... Show MoreThe present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreText science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te