Preferred Language
Articles
/
ThcnKpIBVTCNdQwCIqch
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Existence and Uniqueness of an Integrable Solution for a Fractional Volterra Integral Equation on 𝑹+
...Show More Authors

In this paper, by using the Banach fixed point theorem, we prove the existence and uniqueness theorem of a fractional Volterra integral equation in the space of Lebesgue integrable 𝐿1(𝑅+) on unbounded interval [0,∞).

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MAGNETO HYDRODYNAMIC NATURAL CONVECTION FLOW ON A VERTICAL CYLINDER WITH A PRESENCE OF HEAT GENERATION AND RADIATION
...Show More Authors

The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 18 2024
Journal Name
Inflammopharmacology
The effects of cholesterol and statins on Parkinson’s neuropathology: a narrative review
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
studies of human interferon a B and Y activities on diffrent cell
...Show More Authors

Human interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects

View Publication Preview PDF
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Dependence on Media and the Formation of the Level of the Academic Elite's Knowledge concerning United Nations' Affairs (A research based on a doctoral thesis)
...Show More Authors

The UN organization is considered one of the most important organizations at the international level. It has accomplished multiple tasks and roles of many different issues and events that hit the developing and advanced world countries. It has performed a series of procedures and laws that have had an impact on ending the wars and conflicts that plagued some countries and continued for a period of time in the past. Moreover, it has improved the level of the international relations between a number of countries due to the problems and incidents took place between them. It has relied on finding solutions and treatments for humanitarian problems such as the preservation of the environment, preventing the spread of epidemics and diseases Thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Ecological survey of aquatic macrophytes in Al-Huwaizah Marsh southern of Iraq after inclusion in the world Heritage list
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
The effects of Internet use on university’s students: “A Study on a Sample of Jordanian University’s students "
...Show More Authors

The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as  cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1.   What are the effects of Internet’s use on students?2. What is   the relationship between the effects and demographic variables such as  gender, age, family size an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref