Preferred Language
Articles
/
FRasmYcBVTCNdQwCXFgR
Protecting a sensitive dataset using a time based password in big data

Crossref
View Publication
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
A sensitive spectrophotometric determination of tadalafil in pharmaceutical preparations and industrial wastewater samples

A simple, accurate, precise, rapid, economical and a high sensitive spectrophotometric method has been developed for the determination of tadalafil in pharmaceutical preparations and industrial wastewater samples, which shows a maximum absorbance at 204 nm in 1:1 ethanol-water. Beer's law was obeyed in the range of 1-7?g/ mL ,with molar absorptivity and Sandell ? s sensitivity of 0.783x105l/mol.cm and 4.97 ng/cm2respectively, relative standard deviation of the method was less than 1.7%, and accuracy (average recovery %) was 100 ± 0. 13. The limits of detection and quantitation are 0.18 and 0.54 µg .ml-1, respectively. The method was successfully applied to the determination of tadalafil in some pharmaceutical formulations

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Scopus (3)
Scopus
Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Estimate Raw Water Salinity for the Tigris River for a Long Time Using a Mathematical Model
Abstract<p>The measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi</p> ... Show More
Scopus Crossref
View Publication
Publication Date
Fri Nov 01 2019
Journal Name
International Journal On Interactive Design And Manufacturing (ijidem)
Scopus (30)
Crossref (25)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
Scopus (13)
Crossref (9)
Scopus Crossref
View Publication
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Efficient Plain Password Cryptanalysis Techniques

In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Scopus (5)
Crossref (4)
Scopus Crossref
View Publication