Preferred Language
Articles
/
ChalmYcBVTCNdQwC2VgN
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.

Scopus Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Effect of Velocity on Dissolved Oxygen Cathodic Polarization using a Rotating Cylinder Electrode
...Show More Authors

The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
DEPENDENCE OF MEDIA OFFICES ON THE CABINET'S WEBSITE AS A SOURCE OF INFORMATION
...Show More Authors

     The research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.

The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.

The mechanism of comprehensive account of the limits of research wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Ecotoxicology And Environmental Safety
The role of environmental trace element toxicants on autism: A medical biogeochemistry perspective
...Show More Authors

View Publication Preview PDF
Crossref (28)
Crossref
Publication Date
Wed Jun 11 2008
Journal Name
Journal Of Al-nahrain University
ANALYSIS OF A MOLECULAR DYNAMICS SIMULATION OF THE ACETYLCHOLINESTERASE ENZYME AND ITS COMPLEX WITH (AXILLARIDINE-A) INHIBITOR
...Show More Authors

Molecular dynamics (MD) simulations were carried out in order to investigate the binding mode of axillaridine-A at the active site of human acetylcholinesterase (AChE) enzyme. 2.0 nanosecond of MD simulations was made for the protein and the complex to dynamically explore the active site and the behavior of the ligand at the peripheral AChE binding site. These calculations for the enzyme alone showed that the active site of AChE is located at the bottom of a deep and narrow cavity whose surface is lined with rings of aromatic residues and Tyr72 is almost perpendicular to the Trp286 ring and forms a stable - interaction. The size of the active site of the complex decreases with time due to increase the interaction. Axillaridine-A forms

... Show More
Publication Date
Thu Oct 18 2018
Journal Name
European Journal Of Organic Chemistry
PdII-Mediated Oxidative Amination for Access to a 9-Azabicyclo[4.2.1]nonane Compound Library and Anatoxin-a
...Show More Authors

View Publication Preview PDF
Crossref (5)
Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 27 2018
Journal Name
Revue Académique De La Recherche Juridique
The Scope of the Judge’s Authority in Completing a Contract and the Limitations Thereon – A Comparative Study
...Show More Authors

The contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Effectiveness of Graduality, Escalation and Argumentation in Quranic Politeness Discourse “Surat Ghafir a Model” A Pragmatic Study
...Show More Authors

Theauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea

... Show More
View Publication Preview PDF