Preferred Language
Articles
/
axfH5JMBVTCNdQwC3-tZ
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of Robust Principal Components Depends on the some methods of Projection-Pursuit
...Show More Authors

The analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.

   The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the   variance and covariance matrices. Also the analysis of the princ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of composite variance of experiments carried out according to design Latin box
...Show More Authors

We know that the experiments which conducted by latin square in one location or in one period (season), but there are many cases that need to conduct the same experiments in many locations or in many periods (seasons) to study the interaction  between the treatments and locations or between the treatments and periods (seasons) .In this research we present  an idea for  conduct  the experiment in several locations and in many period (seasons) by using LSD , it represent  acontribution in the area of design and analysis of experiments ,we had written. we had written (theoretically)  the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
KEYS FOR IDENTIFICATION OF GENERA AND SPECIES OF THRIPS (THYSANOPTERA: THRIPIDAE) FROM MIDLE OF IRAQ
...Show More Authors

Keys for 22 species representing 10 genera of Thripidae were provided collection of
samples carried out during 1999-2001 in different localities in the middle of Iraq. Of them
four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips
bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another
fourteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.);
Microcephalothrips abdominils (Crawford Scolothrips sexmaculatus (Pergande),);Scolothrips
pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella
schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Marchal; Retithrips
java

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Quranic readings at Imam Razi In his explanation (Unseen keys)
...Show More Authors

Quranic readings at Imam Razi In his explanation (Unseen keys)

View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Civil Engineering Journal
Model Development for the Prediction of the Resilient Modulus of Warm Mix Asphalt
...Show More Authors

Increasing material prices coupled with the emission of hazardous gases through the production and construction of Hot Mix Asphalt (HMA) has driven a strong movement toward the adoption of sustainable construction technology. Warm Mix Asphalt (WMA) is considered relatively a new technology, which enables the production and compaction of asphalt concrete mixtures at temperatures 15-40 °C lower than that of traditional hot mix asphalt. The Resilient modulus (Mr) which can be defined as the ratio of axial pulsating stress to the corresponding recoverable strain, is used to evaluate the relative quality of materials as well as to generate input for pavement design or pavement evaluation and analysis. Based on the aforementioned preface, it is

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Improving the Durability of Streak and Thermal Insulation of Petroleum Pipes by Using Polymeric Based Paint System: Polymer Matrix Composites have several and wide applications
...Show More Authors

This research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages  (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used  to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculate

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Historical development of Islamic jurisprudence - Develop a model
...Show More Authors

 

       Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.

Then:

       Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Cpwr
Development of a workforce sustainability model for construction
...Show More Authors

Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review
...Show More Authors

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref