Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analysis of Different Types of Tea Leaves by X-Ray Flourescence Technique
...Show More Authors

Samples of tea leaves (Green tea, Gugarate tea and Black tea used commonly in Iraq) are dried, grinded, pressed and submitted for the elemental analysis by x-ray fluorescence technique (XRF). The concentrations of major, minor and trace elements are determined. The major elements were Na, Mg, Al, K, Si, Ca, Mn, Fe, S and P. Of these elements, Ca, concentration in Gugarate tea leaves is three times, it's level in the other types of tea. Titanium, Cl, Rb and Sr are found as minor elements, while other elements such as Cu, Zn, V, Cr, Co, ...etc are found as trace elements. Of these trace elements considerable concentration values are found for some toxic elements Hg, Cd, Pb and As. Green tea contains 1.1 ppm Hg and 4.4 ppm Pb. Gugarate tea

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Mon Dec 29 2014
Journal Name
Information And Knowledge Management
Applying Electronic Commerce for a Proposed Virtual Organization
...Show More Authors

Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per

... Show More
Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Engineering And Technology Journal
A Proposed Method for the Sound Recognition Process
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Title Semiotic in Creative Texts
...Show More Authors

Contemporary researchers realized the importance of the title. Many researches and studies concerned in titles and their analyses on the structural, semantic and pragmatic levels have been developed. Title gives a vital assistance to control the text harmony and to understand its vague aspects. It is the axis which re-generates itself, grows, and re-produces itself; as if it were a head for a body.

Title has strong relation to the reader- waiting horizon, multiplies as many levels of understanding are there. The horizon of waiting is limited by the title, basically, to be the first reason for the text entrance, as the first thing attracts the reader is the title.

Approaching title scientifically and objectively is impossi

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Restriction Shape On Laminar Natural Convection Heat Transfer In A Vertical Circular Tube
...Show More Authors

Natural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and

... Show More
View Publication Preview PDF