Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
A Study Of Strengthening Circular Diaphragm By Ring-Shaped Concentric Ribs
...Show More Authors

 This paper deals with the determination of stresses and deflections of clamped circular diaphragm strengthened by one or two ring-shaped concentric ribs, under uniform static and dynamic pressures. The simulation has been achieved by using the well-known engineering software finite element package MSC/NASTRAN

 As a design study, the effect of using a clamped ring, and the effect of using a ring-shaped rib on both surfaces of diaphragm instead of one, has been discussed in this work. To show the effectiveness of this study, results of this work have been compared with  published data [1].

In  the  conclusion,  the  authors underline  the  validity of  the&n

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 06 2010
Journal Name
Journal Of Engineering
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS
...Show More Authors

Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Mon Nov 19 2018
Journal Name
Al–bahith Al–a'alami
A Proposed Vision for Editing News Forms
...Show More Authors

This research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 03 2025
Journal Name
Journal Mustansiriyah Of Sports Science
The Effect of Ocular Reflex Exercises Using a Proposed Device on Eyes - Hands Coordination for Junior Boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advanced Mechatronic Systems (icamechs)
Hierarchical sliding mode control applied to a single-link flexible joint robot manipulator
...Show More Authors

Trajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of

... Show More
View Publication
Scopus (24)
Crossref (11)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More