Preferred Language
Articles
/
axfH5JMBVTCNdQwC3-tZ
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Improvement of the monochrome image hologram by using a random phase and increasing number of Samples
...Show More Authors

This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of using Project - Based Learning method in development intensive reading skills at middle school students
...Show More Authors

The purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Natural and Mixed Convection in Square Vented Enclosure Filled with Metal Foam
...Show More Authors

Steady natural and mixed convection flow in a square vented enclosure filled with water-saturated aluminum metal foam is numerically investigated. The left vertical wall is kept at constant temperature and the remaining walls are thermally insulated. Forced convection is imposed by providing an inlet at cavity bottom surface, and a vent at the top surface. Natural convection takes place due to the temperature difference inside the enclosure. Darcy-Brinkman-Forchheimer model for fluid flow and the two-equation of the local thermal non-equilibrium model for heat flow was adopted to describe the flow characteristics within the porous cavity. Numerical results are obtained for a wide range of width of the inlet as a fraction

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Infertility problems HS Effects on human development
...Show More Authors
  • The problem of infertility considers one of the chronic problem a which faced the
    individual & families equally . This problem causes a negative effects in psychological ,
    social and development fields. The infertility contributes in weakening the human
    development, when the human development has become as a centre point which centered
    about individual preparing , rehabilitation, training and knowledge toreach to the required
    excellence.
    We think that , the infertility destroys the socially development; therefore the socially and
    scientific institutions are working hard to find successful solution to resolve the problem
    infertility through sophisticated and scientific methods. This problem
... Show More
View Publication Preview PDF
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The expression of Matrix metalloproteinase-2 and cyclooxygenase-2 by immunohistochemistry in patients with colorectal carcinoma
...Show More Authors

Background: Human colorectal carcinogenesis is a complex, multistep and multigenetic process. Matrix metalloproteinase-2 and cyclooxygenase-2 are key enzyme in degradation of extracellular material, are over expressed in several epithelia like colorectal adenocarcinoma.
Objectives: This study was designed to detect the expression of matrix metalloproteinase-2 and cyclooxygenase-2 in patients with colorectal carcinoma and their correlation with age, gender, tumor grade and presence or absence of muscle invasion.
Materials and methods: Immunohistochemical staining of MMP-2 and COX-2 was determined in 40 tissue samples from colorectal patients, from teaching laboratories in Baghdad medical city. In additi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Potential of Salivary Matrix Metalloproteinase 9 to Discriminate Periodontal health and disease
...Show More Authors

Periodontitis is a chronic inflammatory disease resulted from aggravated immune response to a dysbiotic subgingival microbiota of a susceptible host. Consequences of periodontitis are not only limited to the devastating effect on the oral cavity but extends to affect general health of the individual and also exerts economic burdens on the health systems worldwide. Despite these serious outcomes of periodontitis; however, they are avoidable by early diagnosis with proper preventive measures or non-invasive interventions at earlier stages of the disease. Clinically, diagnosis of periodontitis could be overlooked due to certain limitations of the conventional diagnostic methods such as periodontal charting and radiographs. Utilization of re

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 06 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Impact of a Scenario-Based Learning Model in Mathematics Achievement and Mental Motivation for High School Students
...Show More Authors

Crossref (3)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Results In Engineering
Predictive model for stress at ultimate in internally unbonded steel tendons based on genetic expression programming
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Several Subclasses of r-Fold Symmetric Bi-Univalent Functions possess Coefficient Bounds
...Show More Authors

       In this paper we offer two new subclasses of an open unit disk of r-fold symmetric bi-univalent functions. The Taylor-Maclaurin coefficients  have their coefficient bounds calculated. Furthermore, for functions in , we have solved Fekete-  functional issues. For the applicable classes, there are also a few particular special motivator results.

View Publication Preview PDF
Scopus (1)
Scopus Crossref