Preferred Language
Articles
/
ChalmYcBVTCNdQwC2VgN
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.

Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 31 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
THE ROLE OF NANOTECHNOLOGY IN CROP IMPROVEMENT – A REVIEW
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Spectrophotometrically Analysis of PMMA as a low – Doses Dosimeter
...Show More Authors

Polymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter

View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Mathematics
A Mathematical Study for the Transmission of Coronavirus Disease
...Show More Authors

Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 08 2019
Journal Name
International Journal Of Building Pathology And Adaptation
A scientometric analysis of BIM studies in facilities management
...Show More Authors
Purpose

The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.

Design/methodology/approach

This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.

Findings

The findi

... Show More
View Publication
Scopus (36)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
World Academy Of Sciences Journal
Serum angiopoietin‑1 as a biomarker of missed miscarriage
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel Water Quality Index for Iraqi Surface Water
...Show More Authors

The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 24 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
A Linguistic Study of Epitaphs in Selected English Texts
...Show More Authors

This research aims at analysing epitaphs written by Thomas Moore for the memory of Rupert Southey, the epitaph is analysed linguistically and stylistically on four levels graphology, phonology, morphology, and lexico-syntax level to explore the elements that the writer uses the most at each level. Bearing in mind Nowottny approach (1962) (to text analysis) who believes that the linguistic analysis of a literary text is not just a marginal but a necessity” (Bakuuro etal., 2018:34). The researcher has selected and analysed a written epitaph of famous individual associated with English, literature. The study involves both literary and linguistic analysis, with much more concentration through the analysis on the aspect of linguistics. In fact

... Show More
View Publication Preview PDF