Preferred Language
Articles
/
6RZ9aIsBVTCNdQwCaMrn
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Swarm Intelligence Research
A New Strategy Based on GSABAT to Solve Single Objective Optimization Problem
...Show More Authors

This article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN: EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN
...Show More Authors

ABSTRACT

The study aimed to evaluate the information label of some local pickle products and estimate sodium benzoate therein. 85 samples of locally made pickles were collected from Baghdad city markets and randomly from five different areas in Baghdad it included (Al-Shula, Al-Bayaa, Al-Nahrawan, Al-Taji, and Abu Ghraib), which were divided into groups P1, P2, P3, P4 and P5, respectively, according to those areas,  samples information label was scanned and compared with the Iraqi standard specification for the information card of packaged and canned food IQS 230, the results showed that 25.9% of the samples were devoid of the indication card informa

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Copolymerazaion of N-vinyl-2-pyrrolidon with Acrylic Acid and Methylmethacrylate
...Show More Authors

Low conversion copolymerization of N-vinyl-2-pyrrolidon M.W = (111.14) VP (monomer-1) has been conducted with acrylic acid AA and methymethacrylate MMA in ethanol at 70ºC , using Benzoyl peroxide BPO as initiator . The copolymer composition has been determined by elemental analysis. The monomer reactivity ratios have been calculated by the Kelen-Tudos and Finman-Ross graphical procedures . The derived reactivity ratios (r1 , r2 ) are : (0.51 , 4.85) for (VP / AA ) systems and (0.34 , 7.58) for (VP , MMA) systems , and found the reactivity ratios of the monomer AA , MMA is mor than the monomer VP in the copolymerization of (VP / AA) and (VP /MMA) systems respectly . The reactivity ratios values were used for microstructures calculation.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Rheological Evaluation of Polymer (Sav 10) For Polymer Flooding Applications
...Show More Authors

Half of the oil production of the worldwide is a result  of the water flooding  project. But the main concern of this process is mobility control of the injected fluid, because the unfavorable mobility ratio leads to fingering effect. Adding polymer to the injection water increase the water viscosity, therefore, the displacement will be more stable and have a greater sweep efficiency.

   Using of polymer flooding has received more attention these days. Polymer has great potential in the Middle East region, especially in reservoir with high temperature and salinity.

   The main objective of this work is to show the effect of shear rate, salinity, temperature, polymer concentration on polymer v

... Show More
View Publication Preview PDF