This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show MoreIn this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreABSTRACT:
The study aims at expounding the correlation and effect between the Human resource development strategy and Quality Municipality Service within a theoretical framework and a practical framework conducted at Directorate Of Municipalities in holy Karbala . The researcher found during a pilot study that there isn’t enough care paid by the Directorate Of Municipalities in developing its human resources using one strategy or a number of strategies and their effect on the Quality Municipality Service. Thus a number of research questions were set concerning the existence of clear perception in the Directorates Of Municipalities concerning the strategies of developing both the human resource an Qualit
... Show MoreThe propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.
In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreThe aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreImmunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of pub
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More