This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
Is the subject of the mind took a dimension in philosophy and psychology , and has cared psychologists this topic to a large extent , I started education institutions interest in the capabilities of intelligence since the early twentieth century , and the development of interest in them until he arrived to find Standards and Criteria to identify the degree IQ of any individual , and began to educational institutions interested in mental talent and talented .
The United States is the country chock first of these research projects , but they devoted all their attention on the wish talent mental and Gifted , until I got to the projects, the so-called time ( ( wars of the mind ) ) and projects Schools gifted
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreAt the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system .
Lean Accounting that has appeared as aresponse for changes occurred of economic units adoption for lean accounting system instead of wide production system : through it management of economic units has been changed from management by top departments into management by value flows : has provide new method for accounting costs according to value flow
... Show MoreAbstract:
The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a
... Show MoreGlobalization as phenomena has affected all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the
... Show MoreThis research discusses the subject of emotional stimulation factors through the stages of product design interaction with the consumer and what they reflect in the formation of a self-consideration of the design in his emotional memory regarding the specific brand through the following question (What is the emotional stimulus in the design of certain products and its reflection on the consumer during the processes of receiving and using it?), The importance of the research comes in the connection of design elements with many sensory factors used and motivating to attract the consumer to the acquisition of a specific design and the demand for its experience, the study aims Detection and access to emotional stimulation in the design of th
... Show MoreA skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More