Preferred Language
Articles
/
GRZaVYcBVTCNdQwCnUaI
Identification of key determinants in<i>Porphyromonas gingivalis</i>host-cell invasion assays
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Heuristic Modularity for Complex Identification in Protein-Protein Interaction Networks
...Show More Authors

     Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function.   The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties.  The modulari

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Genetic characteristics and β-cell Autoimmunity in T1DM Children
...Show More Authors

Background: TIDM is known to be polygenic disease that appears from the interaction of mutation in multiple genes including HLA. The autoimmune mediated destruction of
pancreatic β-cells is reflected by the presence of autoantibodies against prominent antigens in the pancreatic β-cells.
Objective: This study was designed to investigate the role of HLA-class I and class II antigens in the etiology of type 1 diabetes mellitus (T1DM) and also assessment of
glutamic acid decarboxylase (GAD65) autoantibodies in the patients at the onset of the disease.
Patients & Methods: Sixty T1DM patients who were newly onset of the disease (diagnosed less than five months) were selected. Eighty apparently healthy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Angiopoietin-2 Immunohistochemical Expression in Oral Squamous cell Carcinoma
...Show More Authors

Background: There are various secreted proteins affecting the prognosis of oral squamous cell carcinoma (OSCC) and one of them is Angiopoietin-2(Ang-2) which is thought to have an essential role in the development and progression of the tumor. Aim of the study: This study was conducted to determine the expression of (Ang-2) in (OSCC) to assess its correlations with clinicopathological parameters of the tumor. Material and Methods: 36 formalin- fixed, paraffin- embedded tissue blocks histologically diagnosed as OSCC were examined for Ang-2 immunohistochemical expression semi quantitively. Results: The expression of Ang-2 was significantly associated with histopathological grade (P value=0.023), while there is no significant association wi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Adiponectin , ?-Cell Dysfunction in Iraqi Women with Gestational Diabetes
...Show More Authors

Gestational diabetes mellitus (GDM) is a complication of gestation that is characterized by impaired glucose tolerance with first recognition during gestation. It develops when ?- cell of pancreas fail to compensate the diminished insulin sensitivity during gestation. This study aims to investigate the relationship between mother adiponectin level and ?- cell dysfunction with development gestational diabetes mellitus (GDM) and other parameters in the last trimester of pregnancy. This study includes (80) subjects ( pregnant women) in the third trimester of pregnancy, (40) healthy pregnant individuals as control group aged between (17 - 42) years and (40) gestational diabetes mellitus patients with aged between (20 - 42) years. The f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review: Protein Identification by LC-MS: Principles, Instrumentation, and Applications: Protein Identification by LC-MS
...Show More Authors

This review will focus on protein and peptide separation studies of the period 1995 to 2010. Peptide and protein analysis have developed dramatically after applying mass spectrometry (MS) technology and other related techniques, such as two-dimensional liquid chromatography and two-dimensional gel electrophoresis. Mass spectrometry involves measurements of mass-to-charge ratios of the ionized sample. High-performance liquid chromatography (HPLC) is an important technique that is usually applied before MS is conducted due to its efficient separation. Characterization of proteins provides a foundation for the fundamental understanding of biology aspects. In this review, instrumentation, principle, applications, developments, and accuracy o

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref