Preferred Language
Articles
/
UhauZIkBVTCNdQwCaonr
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 500 per frame, and each number value reaches more than 1000 to be used or switched when needed. The method also provides some difficulty in guessing the keys from the transmitted video and the reason for the development and emergence of many communication programs Viber, WhatsApp, and other programs, enabling to use the proposed method in these programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 25 2025
Journal Name
Modern Sport
The Effect of Training Exercises Using an Innovative Device on Developing Skill Performance Among Female Foil Fencers
...Show More Authors

View Publication
Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Agriculture And Biology
Dietary Replacement with Food Waste and Black Soldier Fly Larvae Supplementation Improved Growth Performance, Nutrient Digestibility and Intestinal Microbial Population in Broilers
...Show More Authors

This study was aimed to evaluate the effect of conventional ingredients replacement with alternative ingredients on growth performance, carcass quality, nutrient digestibility and intestinal microbial of broilers. One hundred twenty Cobb500 broiler chicks were randomly assigned to four diets. Corn, soybean meal and fish meal were replaced with rice waste, meat and bone waste and black soldier fly larvae (BSFL) at 0, 10, 30 and 50% to form four treatments. Body weight gain, feed conversion ratio and digestibility of crude protein and fat were improved in broilers fed the replacement diets. Feed intake was not affected by the treatments suggesting that the replacement diets were well accepted by the chicken. Escherichia coli was decre

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Surface Hardness Measurement of Stone and Improved Die Stone After the Addition of a Mixture of Chemical Additives with Different Proportion
...Show More Authors

Background: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (49)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Sun Sep 30 2018
Journal Name
الجامعة المستنصرية كلية الإدارة و الاقتصاد
The possibility of adoption of hybrid cloud computing in Iraqi universities : an analytical study using technology acceptance model
...Show More Authors

الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Chemical Data Collections
Removal of an anionic Eosin dye from aqueous solution using modified activated carbon prepared from date palm fronds
...Show More Authors

View Publication
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Ain Shams Engineering Journal
Estimating server utilization rate in single server queuing models using an approximate solution of stiff fluid flow model
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref