Preferred Language
Articles
/
ahbtBYcBVTCNdQwCQC8s
Strongly Connected Ramanujan Graphs for Highly Symmetric LDPC Codes
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Almost and Strongly Almost Approximately Nearly Quasi Compactly Packed Modules
...Show More Authors

In this paper, we present the almost approximately nearly quasi compactly packed (submodules) modules as an application of the almost approximately nearly quasiprime submodule. We give some examples, remarks, and properties of this concept. Also, as the strong form of this concept, we introduce the strongly, almost approximately nearly quasi compactly packed (submodules) modules. Moreover, we present the definitions of almost approximately nearly quasiprime radical submodules and almost approximately nearly quasiprime radical submodules and give some basic properties of these concepts that will be needed in section four of this research. We study these two concepts extensively.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Al-qadisiyah Journal Of Pure Science
Weakly and Strongly Forms of Fibrewise Fuzzy ω-Topological Spaces
...Show More Authors

This paper is devoted to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuzzy -ω-topological spaces, weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω- topological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω-topological spaces.

View Publication Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Iraqi Journal Of Science
T-Stable-extending Modules and Strongly T- stable Extending Modules
...Show More Authors

     In this paper we introduce the notions of t-stable extending and strongly t-stable extending modules. We investigate properties and characterizations of each of these concepts. It is shown that a direct sum of t-stable extending modules is t-stable extending while with certain conditions a direct sum of strongly t-stable extending is strongly t-stable extending. Also, it is proved that under certain condition, a stable submodule of t-stable extending (strongly t-stable extending) inherits the property.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Ultra low power and highly linearized LNA for V-band RF applications in 180 nm CMOS technology
...Show More Authors

Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 10 2024
Journal Name
Journal Of Optics
Pulsed laser deposition of Pd/WO3 nanoparticles on Si nanostructure for highly sensitive room-temperature gas sensors
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Certain Types of Linear Codes over the Finite Field of Order Twenty-Five
...Show More Authors

The aim of the paper is to compute projective maximum distance separable codes, -MDS of two and three dimensions with certain lengths and Hamming weight distribution from the arcs in the projective line and plane over the finite field of order twenty-five. Also, the linear codes generated by an incidence matrix of points and lines of  were studied over different finite fields.  

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref