Preferred Language
Articles
/
axfH5JMBVTCNdQwC3-tZ
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Potential of Salivary Matrix Metalloproteinase 9 to Discriminate Periodontal health and disease
...Show More Authors

Periodontitis is a chronic inflammatory disease resulted from aggravated immune response to a dysbiotic subgingival microbiota of a susceptible host. Consequences of periodontitis are not only limited to the devastating effect on the oral cavity but extends to affect general health of the individual and also exerts economic burdens on the health systems worldwide. Despite these serious outcomes of periodontitis; however, they are avoidable by early diagnosis with proper preventive measures or non-invasive interventions at earlier stages of the disease. Clinically, diagnosis of periodontitis could be overlooked due to certain limitations of the conventional diagnostic methods such as periodontal charting and radiographs. Utilization of re

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 19 2017
Journal Name
Al-khwarizmi Engineering Journal
Improve Wear Resistance on Al 332 Alloy Matrix- Micro -Nano Al2O3 Particles Reinforced Composite
...Show More Authors

The wear behavior of alumina particulate reinforced A332 aluminium alloy composites produced by a stir casting process technique were investigated. A pin-on-disc type apparatus was employed for determining the sliding wear rate in composite samples at different grain size (1 µm, 12µm, 50 nm) and different weight percentage (0.05-0.1-0.5-1) wt% of alumina respectively. Mechanical properties characterization which strongly depends on microstructure properties of reinforcement revealed that the presence of ( nano , micro) alumina particulates lead to simultaneous increase in hardness, ultimate tensile stress (UTS), wear resistances. The results revealed that UTS, Hardness, Wear resistances increases with the increase in the percentage of

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Multiple Intelligence Test Item Selection-Based on Howard Gardner's MI Model Using a Generalized Partial Estimation Model: Ministry of Education \ Karkh First Directorate of Education
...Show More Authors

The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Egyptian Journal Of Chemistry
Development of a nanostructured double-layer coated tablet based on polyethylene glycol/gelatin as a platform for hydrophobic molecules delivery
...Show More Authors

The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Infertility problems HS Effects on human development
...Show More Authors
  • The problem of infertility considers one of the chronic problem a which faced the
    individual & families equally . This problem causes a negative effects in psychological ,
    social and development fields. The infertility contributes in weakening the human
    development, when the human development has become as a centre point which centered
    about individual preparing , rehabilitation, training and knowledge toreach to the required
    excellence.
    We think that , the infertility destroys the socially development; therefore the socially and
    scientific institutions are working hard to find successful solution to resolve the problem
    infertility through sophisticated and scientific methods. This problem
... Show More
View Publication Preview PDF
Publication Date
Tue Dec 16 2008
Journal Name
Journal Of Planner And Development
City of Baghdad Analysis of the mechanisms of economic action in the development and development
...Show More Authors

The economy of a city has an important role not only in its establishment but also in its development. This is quite clear in the city of Baghdad throughout its history since its building in 762 A.D. In addition, most of its problems that the city is suffering from are basically related to not giving enough importance to the economic factors in the master planning of Baghdad since 1950’s. This may explain the failiars of master plans in dealing with the actual population growth and the city's inability to absorb such increases and interrelated and diverse activities which are negatively reflected on the economic variables particularly the effect on the land values, and the strong competitions amongst the land uses without previ

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 04 2021
Journal Name
Membranes
Model Based Simulation and Genetic Algorithm Based Optimisation of Spiral Wound Membrane RO Process for Improved Dimethylphenol Rejection from Wastewater
...Show More Authors

Reverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG

... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref