Preferred Language
Articles
/
bsj-1071
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Augmentation of Nanofluids Heat transfer in a Circular Tube with Baffled Winged Twisted Swirl Generator
...Show More Authors

This article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different  forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of

... Show More
View Publication
Publication Date
Sun Jun 05 2022
Journal Name
Network
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu May 25 2017
Journal Name
Genome Announcements
Complete Genome Sequence of Lytic Bacteriophage VPUSM 8 against O1 El Tor Inaba Vibrio cholerae
...Show More Authors
ABSTRACT<p> The complete genome sequence of bacteriophage VPUSM 8 against O1 El Tor Inaba <named-content content-type="genus-species">Vibrio cholerae</named-content> is reported here. The isolated VPUSM 8 has potential use in future phage therapy or as a biocontrol agent for the prevention and treatment of cholera. </p>
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 02 2017
Journal Name
Al-khwarizmi Engineering Journal (alkej)
Augmentation of Nanofluids Heat transfer in a Circular Tube with Baffled Winged Twisted Swirl Generator
...Show More Authors

Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study the random walking of the ISX60 market index For the Iraq Stock Exchange
...Show More Authors

This paper aimed to test random walking through the ISX60 market index for the ability to judge market efficiency at a weak level. The study used Serial Correlation Test, the Runs Test, the Variance Ratio Test, as well as the Rescaled Range Test.The population of the study represents of Iraq Stock Exchange. The study concluded accepting the hypothesis of the study that the returns of the ISX60 market index in the Iraqi market for securities does not follow the random walking in general and as a result the Iraq market for securities is inefficient within the weak level of efficiency and the study recommended need a supervisors work in the Iraqi market for securities to activate all means a which will work to communication with information

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 30 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical approximate solutions of random integro differential equations with laplace decomposition method
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT

... Show More
Scopus (3)
Scopus
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Non Traumatic Hip Osteonecrosis Treated By Non Vascularised Bone Graft Versus Core Decompression
...Show More Authors

Background: Avascular necrosis (AVN) is defined as cellular death of bone components due to interruption of the blood supply; the bone structures then collapse, resulting in bone destruction, pain, and loss of joint function. AVN is associated with numerous conditions and usually involves the epiphysis of long bones, such as the femoral head. In clinical practice, AVN is most commonly encountered in the hip. Early diagnosis and appropriate intervention can delay the need for joint replacement. However, most patients present late in the disease course. Without treatment, the process is almost always progressive, leading to joint destruction within 5 years.Treatment of a vascular necrosis depends mainly on early diagnosis which mainly base

... Show More
View Publication Preview PDF
Crossref