The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circular queue in this work allows to encrypt each character of plaintext by one of cipher methods which controlled by control key for selection process. The scheduling of above cipher methods implementation depends on control key. The experiment results of the proposed hybrid text cryptography method shows ability to cipher and decipher an important data with effectively and efficiently. Utilizing the properties of different cipher methods that are scheduled in circular queue (Caesar, Vigenère, Affine, and Multiplicative) leads to consume time less than other methods when they used alone, so, the important concepts in cryptography process such as complexity, integrity, execution time and security are meet in the proposed hybrid text cryptography method in ef ective manner.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne
... Show More|
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting info |
The current research seeks to achieve several objectives, including knowing the extent of the audit directorate of the Ministry of Construction, Housing and General Municipalities of the International Standard (ISO19011:2018) regarding determining the efficiency and evaluation of auditors and diagnosing the gap between requirements and application and knowing the reasons for not applying some of the items in the standard, starting from the problem, The field raised the following question (Does the audit directorate determine the efficiency and evaluation of auditors according to the standard ISO19011:2018?), and the importance of research lies in determining the return that can be achieved by the directorate through its application of stand
... Show MoreThe research aims to identify the impact of managing performance's employees in building intellectual capital, Because employing the practice of managing the performance of employees may acquire familiar skills to improve their performance and reflect on the construction of intellectual capital in the surveyed area, Especially that the independent dimension represented by the management of the performance of employees is one of the important topics that has received attention in the world of management in general and human resource management in particular. While the adopted dimension was represented by Intellectual capital in the important practice of human resource management in the increasing of their knowledge, to
... Show Moreيسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال
In their cross-sectional study, Al-Rubaye et al studied the extent of vitamin D (VD) deficiency/ insufficiency, factors affecting its degree, and the adverse outcomes of the altered VD status among a group of mothers and their neonates from Baghdad, Iraq. They found that 96.6% of the mothers had VD deficiency/ insufficiency compared to 86.4% in their neonates. Maternal VD levels and neonatal weights were significantly correlated with neonatal VD levels. We believe that the study results need to be revised. This is based two points listed in this letter to editor
Abstract :
The research aims to Estimate the Strength of Strategic Innovation application in terms of application strength , and on the overall level in number of Iraqi Industrial business organizations . After wards determine whether their is differerences among those organizations in application process for the dimensions , and for the overall process .
The Research revealed number of conclusions including that the process of strategic innovation is applied in a good Level , and demonstrates the desier of the industrial companies Leaders to Launch beyond the familiar products , and to provide new products that
... Show More