Preferred Language
Articles
/
XRYqE4kBVTCNdQwCfYXi
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (radius center-end (RCE)) represent the second key. While the diagonal-radius center and the retina vessel's end (diagonal-radius center-end (DRCE)) represent the third key. The results illustrate the process's validity and applicability. Also, improve the time required to decrypt the cipher-text by a brute force attack (BFA) from (4.358e+139) year in the compared technique to (1.3074e+140) year for retina3. The BFA time will increase with increasing the number of retina vessels, as in retina1, 2, and 3, which have 24, 53, and 103 retina vessels.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Oct 24 2022
Journal Name
Energies
Double-Slope Solar Still Productivity Based on the Number of Rubber Scraper Motions
...Show More Authors

In low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Gas Sensor Application of New Composite Based on MWCNTs:CoPc:Metal Oxide
...Show More Authors

The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with  CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (36)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Smart Irrigation Technique in the Fixed Irrigation System Based on Soil Moisture Content
...Show More Authors
Abstract<p>The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 13 2025
Journal Name
University Of Anbar Sport And Physical Education Science Journal
That the child is aged 7 years, surrounded by information, knowledge and skillsvaried,
...Show More Authors

Abstract That the child is aged 7 years, surrounded by information, knowledge and skillsvaried, which constitute the raw material of experience teaching and is in the rule of inputlearning, if received by the student of these data are positive, these data require research and audit, the style becomes more positive, effective, and then becomes the explorer, butnot done exploration efficiency without the visual, auditory and sensory owned by thechildren. So study aimed to identify the values of the optical track and explore mathematical and find the relationship between them. And use the descriptive approach in a manner the linkon the children of the first year of primary school age (6-7) years in my school Waziriya and Karkh, during the peri

... Show More
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Pakistan: The most dangerous terrorist extremism hotbed (a study information, limitations, and factors)
...Show More Authors

   Receipt date:10/27/2021    accepted date:12/15/2021     Publication date:31/12/2021

        Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The evaluation of the role of the information system in reducing tax evasion
...Show More Authors

This research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.

At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2013
Journal Name
Isprs International Journal Of Geo-information
Using Geometric Properties to Evaluate Possible Integration of Authoritative and Volunteered Geographic Information
...Show More Authors

The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und

... Show More
View Publication
Scopus (28)
Crossref (26)
Scopus Clarivate Crossref