Preferred Language
Articles
/
PheUFJIBVTCNdQwC057z
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Using Spatial Analysis Methods to Evaluate the Soil Contamination of Baghdad City, Iraq
...Show More Authors
Abstract<p>The current study aims to identify soil pollutants from heavy metals The study utilized 40 topsoil (5 cm) samples, which adapted and divided into seven regions lies in Baghdad governorate, included (Al-Husainya,(Hs) Al-Doura (Do), Sharie Al-Matar (SM), Al-Waziria (Wz), Nharawan (Nh), Abu Ghraib (Abu) and Al-Mahmoodyia (Mh)). Spatial distribution maps of Nickel (Ni), Manganese (Mn), Lead (Pb) and Zinc (Zn) were created for Baghdad city using Geographic Information Systems (GIS). The concentrations of four heavy metals in the soil of different area of Baghdad were measured and observed using XRF instrument. The result found highest values of Pb and Zn at the middle of the Baghdad in (Wz</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 06 2021
Journal Name
المجلة العراقية لبحوث السوق وحماية المستهلك
The exposure of Baghdad slum residents to television drug advertisements and its trends
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Calculating land surface temperature of South Baghdad by the using Landsat 8 images
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Use of Light Text in Arab TV Shows (The Voice TV Program) -A Model
...Show More Authors

The research tackles an important subject, namely, the light text and how it works well in the Arab television programs. The methodological framework of the research     presents the research problem stated in the following question: How can the text be used and what is its impact in the Arab TV programs? The importance of this research is that it deals with the subject of light text and its impact on Arab television programs.

This study is useful to the workers and scholars in the field of lighting as well as the goal of the research in (studying of the employment of light text in Arab television programs).

The limits of research were manifested in the study of the light text and how to make use of it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Developing the School Curriculum in a way Helps Raising the Values of Forgiveness and Acceptance
...Show More Authors

تناولنا في هذه الدراسة التأكيد على تطوير المناهج الدراسية بأتجاه تنمية قيم التسامح والتعايش السلمي ، لان ثقافة التسامح باتت من الضرورات الملحة التي يفرضها الواقع الراهن لمواجهة العنف المجتمعي ، مما يوجب الحرص على ترسيخ القيم الانسانية ، لان التسامح من الصفات التي تحبها النفوس وتنجذب اليها القلوب .

والقيم الاخلاقية والسلوكية كالتسامح وغيرها ، من الامور الرئيسية لعمليتي التربية والتعليم في المدارس وال

... Show More
View Publication Preview PDF