Preferred Language
Articles
/
-oaET4YBIXToZYALG4E-
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of the present algorithm is simple, and the running operations required small execution time for encryption-decryption sensing data. Hence, a developed algorithm called DPRESENT was introduced to improve the complexity of the cipher text based on the PRESENT algorithm and DNA cryptography technique for developing a lightweight cipher algorithm. The NIST suite showed that the proposed algorithm tests presented high level of randomness and complexity. The execution time for the proposed algorithm was kept minimal as the current cipher algorithm. The developed algorithm is a new trend that can be applied for different lightweight cryptosystems to achieve the trade-off among complexity and speed as a robust cipher algorithm.

Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 05 2021
Journal Name
Solid State Technology
Genetic Algorithms in Construction Project Management: A Review
...Show More Authors

Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Design and evalution of a solar PV system
...Show More Authors

PV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building   220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Investigation of Effecting Parameters in a Turning Operation
...Show More Authors

        In this study multi objective optimization is utilized to optimize a turning operation to reveal the appropriate level of process features. The goal of this work is to evaluate the optimal combination of cutting parameters like feed, spindle speed, inclination angle and workpiece material to have a best surface quality Taguchi technique L9 mixed orthogonal array, has been adopted to optimize the roughness of surface. Three rods of length around (200 mm) for the three metals are used for this work. Each rod is divided into three parts with 50 mm length. For brass the optimum parametric mix for minimum Ra is A1, B1 and C3, i.e., at tool inclination angle (5), feedrate of 0.01, spindle speed of 120

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-adab Journal
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta

... Show More
Preview PDF
Publication Date
Sun Mar 29 2020
Journal Name
International Journal Of Simulation: Systems, Science & Technology
A New Compact Microstrip Antenna for WSN Applications
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Tigris And Euphrates Rivers: Their Environment From Headwaters To Mouth
Algal Studies in Iraqi Inland Waters. A Review
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Preparation of nano-microfibers with a different polymers
...Show More Authors

Abstract: In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.

Preview PDF
Publication Date
Thu Aug 14 2025
Journal Name
Al–bahith Al–a'alami
PUBLIC RELATIONS AN ATTEMPT TO BUILD A DEFINITION
...Show More Authors

This research deals with the most famous existing definitions of public relations, in an attempt to achieve a definition that will be added to the other existing and widespread definitions, especially that big developments have taken place in the concept of public relations and their idiomatic use.

In addition, many definitions of public relations have been restricted to some limited descriptions, therefore many of the descriptions given to the public relations are basically definitions as well as characteristics of the public relations.

This research aims at setting and formulating the definitions of public relations, it also deals with its credibility in achieving its significance in order to reach a new definition that

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication