Preferred Language
Articles
/
bsj-3985
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Lecture Notes In Civil Engineering
Geometric Nonlinear Synthetic Earthquake Analysis of Base Isolated Tall Steel Buildings Under Site-Specific Seismic Loading
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Classical Continuous Optimal Control for Quaternary Nonlinear Parabolic Boundary Value Problems with State Vector Constraints
...Show More Authors

This paper aims to study the quaternary classical continuous optimal control problem consisting of the quaternary nonlinear parabolic boundary value problem, the cost function, and the equality and inequality constraints on the state and the control. Under appropriate hypotheses, it is demonstrated that the quaternary classical continuous optimal control ruling by the quaternary nonlinear parabolic boundary value problem has a quaternary classical continuous optimal control vector that satisfies the equality constraint and inequality state and control constraint. Moreover, mathematical formulation of the quaternary adjoint equations related to the quaternary state equations is discovered, and then the weak form of the quaternary adjoint

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Study the Effect of Cold Plasma on the Nonlinear Properties of Polymeric Membranes Rod Amine (R3Go)
...Show More Authors

The nonlinear optical properties for polymeric (PMMA) doping with dye Rhodmine (R3Go) has been studied .The samples are prepared by normal polymerization method with concentrations of 5x10-5mol/l and a thickness of 272.5µm.

                         Plasma effect was studied on samples prepared before and after exposure to the Nd: YAG laser for three times 5, 10 and 15 minutes. Z-Scan technique is used to determine the nonlinear optical properties such as; refractive index (n2) and the coefficient of nonlinear absorption (β). It was found that the nonlinear properties is change by increasi

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (16)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Illegal migration and the European Union " a perusal of securing the phenomenon"
...Show More Authors

Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الظواهر السلوكية غير المرغوب فيها لدى مستخدمي الحاسوب والإنترنت
...Show More Authors

أهمية البحث والحاجة إليه:

          من مظاهر التواصل الحضاري في جانبه العلمي والتكنولوجي هو متابعة أبناء مجتمعنا ولاسيما الشباب لكل منجز حديث واتخاذه وسيلة للحصول على المعلومات والمعرفة والتسلية، بحيث أصبح هذا التعامل ممارسة يومية حياتية، وهذا دليل على مدى تفتح ذهنية وعقلية ورغبات أبنائنا ومواكبتهم لروح العصر ومتطلباته وتعبيراً صادقاً عنه فضلاً عن إشغال أوقات ف

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 12 2019
Journal Name
Journal Of The College Of Education For Women
Uncompleted Personality and it’s relation with Some Variables of the University Students
...Show More Authors

Uncompleted Personality and it’s relation with Some Variables of the University Students

View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
حوليات اداب عين شمس
غير منشورة من عصر اور الثالثة(Bullae( وصولات تسلم
...Show More Authors

شهدت معظم المدن السومرية أزدهاراً أقتصادياً خلال عصر أور الثالثة ،أنعكس ذلك من خلال النصوص المسمارية المكتشفة ذات المضامين الاقتصادية المتنوعة ومنها (وصولات تسلم Bullae) التي تميزت بعصر أور الثالثة بأشكالها المتعددة ومنها: الكروية والمربعة والمستطيلة والمثلثة والمضلعة ومعظمها يحتوي على طبعات أختام فضلاً عن أنها تكون مثقوبة طولياً لغرض التعليق.

Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
معوقات عمل المرأة في المنظمات غير الحكومية بحث ميداني
...Show More Authors

The issue of volunteerism is one of the most important issues that have become prominent in social sciences and contemporary social thought, especially as a result of the transformations and changes that the world undergoes today. The voluntary sector has become the concern of all societies and governments for its development and service to society and various sectors. The practice of women is prominent in the work of volunteerism after 2003 in Iraq, but its work face a number of obstacles and hindrance. The problem of research is the obstacles of women's work in non-governmental organizations. The research aims to identify the nature and characteristics of volunteer work of Iraqi women.        &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 15 2025
Journal Name
مجلة الاداب
نصوص مسمارية لقروض غير منشورة من سلالة أور الثالثة
...Show More Authors

تناول البحث دراسة خمسة نصوص مسمارية لقروض غير منشورة من سلالة أور الثالثة وتحليلها وترجمتها وهي من مجموعة المتحف العراقي, يعود تاريخها الى زمن سلالة أور الثالثة (2012-2004ق.م) تحديدا الى زمن الملكين شوسين (2037- 2029ق.م) وابي سين (2028-2004 ق.م), اما مضامينها فهي قروض بمادتي الشعير(ثلاثة نصوص) الفضة (نصان), والقروض على نوعين قروض بفائدة (ur5 - ra), وقروض بدون فائدة (maš2 - nu - tuk), وقد حددت نسبة الفائدة في القروض 1/3 33% لمادة الشعير و20% لما

... Show More
View Publication Preview PDF