Preferred Language
Articles
/
jcoeduw-884
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured deterministicallyand then compared to
statistical expectations using a chi-square test.
In this paper the Run Criterion, is calculated, it can be calculated for any key generator
before it be implemented or constructed (software or hardware).The cryptosystems: Linear,
Product and Brüer are chosen as study cases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Influence of Organizational Power on the Achievement of Entrepreneurship for Business Organizations An Analytical Study of the Views of a Sample of Managers in the Iraqi Ministry of Education
...Show More Authors

This research aims to study the influence of organizational power on the achievement of entrepreneurship for business organizations. It is an analytical study of the views of a sample of managers in the Iraqi Ministry of Education. The research highlights the contribution that can be made from the knowledge of the theory of business organizations in achieving organizational success. The organizational power of the organization contributes to achieving entrepreneurship in the business environment and achieving a competitive position in the work environment. The research dealt with two variables: the first is the independent variable, the organizational power in its dimensions (Expend Power, Structural Power, Prestige Power). And t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
The Inauguration of Faisal Bin Al -husain as Iraq King (A Study of British Documents)
...Show More Authors

Husain as a king of Iraq.
This paper deals with the British communication with faisel . then Winston Churchill's speech in British common house .then fodlowed by arriving faisal to Iraq after that the referend um faisel .
The his claims of British maneuver lastly coronation on faisal & his inauguration as a king of Iraq.

View Publication Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Dimensions of binding and non-binding social responsibility and its relationship to organizational performance / Field Study in telecommunications companies in the Republic of yemen
...Show More Authors

The study aims at measuring the dimensions of binding and non-binding social responsibility and its relation to the organizational performance in telecommunication companies in the Republic of Yemen using analytical descriptive approach and questionnaire as a main tool for data collection and comprehensive inventory method.

It has been found  that there is a positive effect and significant moral relation between social responsibility with its binding and non-binding dimensions  and the organizational performance of telecommunication companies in the Republic of Yemen at a level of significance below (0.05). It has also been found that the correlation between the non-binding social responsibilit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Sacrament of Marriage in Christianity: Descriptive study
...Show More Authors

The Sacrament of Marriage in the Christian Religion

View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Al–bahith Al–a'alami
The Pressures Affecting the Performance of Iraqi Media before the Legislative Elections of 2018 (Iraqi Satellite News Channel- as a Model): A Survey Study  Dr.Safad Husam Hammody
...Show More Authors

The modernity of election practices of the elections in Iraq, according to the democratic approach, has led to a struggle between political rival forces reflecting a deep pressure on the tools involved in the management, marketing or control of these elections across the general social level. Hence the problem of research resides in answering the following question: What is the nature and size of the pressures affecting the media performance of Al-Iraqia News channel before the legislative elections of 2018 in Iraq?
      The objectives of the research were the following:
1. to identify the nature of the pressures that limit the Al-Iraqia News channel’s perfo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
The Tribal Power in Contemporary Iraq: A Sociological Analysis
...Show More Authors

This is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of ci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A comparison of the Semiparametric Estimators model smoothing methods different using
...Show More Authors

In this paper, we made comparison among different parametric ,nonparametric and semiparametric estimators for partial linear regression model users parametric represented by ols and nonparametric methods represented by cubic smoothing spline estimator and Nadaraya-Watson estimator, we study three nonparametric regression models and samples sizes  n=40,60,100,variances used σ2=0.5,1,1.5 the results  for the first model show that N.W estimator for partial linear regression model(PLM) is the best followed the cubic smoothing spline estimator for (PLM),and the results of the second and the third model show that the best estimator is C.S.S.followed by N.W estimator for (PLM) ,the

... Show More
View Publication Preview PDF
Crossref