Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show MoreIn this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.
A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of
... Show Moreيؤدي عرض معلومات مضللة او محرفة ضمن القوائم المالية والتي تعد أهم مصادر المعلومات الموثوقة التي يُعول عليها لاتخاذ القرارات السليمة الى عدم قدرتها على عكس نتيجة النشاط والمركز المالي لها او اعمال الوحدة الاقتصادية لتلك الفترات الزمنية بصورة صادقة وعادلة نتيجة لنوعية المعلومات المفصح عنها في القوائم المالية لذلك زاد الاهتمام بتطوير الممارسات المحاسبية لتتضمن افصاحات كافية بغرض اعطائهم صورة صادقة وعادلة
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreVirtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per
... Show MoreThis study presents an investigation about the effect of fire flame on the punching shear strength of hybrid fiber reinforced concrete flat plates. The main considered parameters are the fiber type (steel or glass) and the burning steady-state temperatures (500 and 600°C). A total of 9 half-scale flat plate specimens of dimensions 1500mm×1500mm×100mm and 1.5% fiber volume fraction were cast and divided into 3 groups. Each group consisted of 3 specimens that were identical to those in the other groups. The specimens of the second and the third groups were subjected to fire flame influence for 1 hour and steady-state temperature of 500 and 600°C respectively. Regarding the cooling process, water sprinkling was applied directly aft
... Show Moreسعي المجتمع العراقي منذ أكثر من نصف قرن مضى لإعادة استثمار عشرات المليارات من الدولارات من الإيرادات النفطية في القطاع الزراعي وهياكله وبنياته التحية، كإنشاء السدود والخزانات المائية واستصلاح الأراضي والمشاريع الإنتاجية الحيوانية والنباتية وبطاقات كادت تقترب او تتجاوز حاجز طلب السكان من الأغذية والمنتوجات الزراعية التي تغذي الصناعة الا ان الزيادة السكانية وتحسن مستوى الدخل النفطي شكلا انتقالا جدي
... Show More