Preferred Language
Articles
/
bsj-3985
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Novel use of XRF in the adsorption processes for the direct analysis of cadmium and silver in absorbent Na-alginate beads
...Show More Authors

         The Na-alginate bead is commonly used in biotechnology fields such as adsorption due to ion exchange between Ca and Na with elements. Scanning electron microscopy (SEM-EDX) has proven to be a comparative method in the detections of these adsorbed elements, but the un-flat forming area of beads that can introduce impossible of the detection of element adsorbed. In contrast, X-ray fluorescence (XRF) documents analysis of elements, direct examination, which may analysis the adsorbents of elements. Here, this Study evaluated the possibility by using XRF for the direct analysis for examples of Cd and Ag in a bench stand. This Study compared this to commonly use

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 20 2005
Journal Name
الجامعة المستنصرية / كلية التربية الأساسية
اثر استخدام استراتيجية بوليا واستراتيجية التمثيل المعرفي في تحصيل واستبقاء مادة الرياضيات لدى طلبة المرحلة المتوسطة
...Show More Authors

Publication Date
Sat May 04 2019
Journal Name
Journal Of Physical Education
تأثير استخدام تمرينات خاصة وفقا لنموذج كولب(النط التكيفي) في تعلم مهارة الطبطبة بكرة اليد للطالبات
...Show More Authors

تعتبر لعبة كرة اليد من الالعاب الفرقية، وان هذه اللعبة تستند الى قاعدة اساسية وهي الاداء الصحيح للمهارات، وللتقدم في هذه اللعبة يجب تعلم وأتقان اداء المهارات للوصول الى مستوى افضل للتعلم، من خلال الدور الذي يؤديه اسلوب نموذج كولب لأنماط التعلم (التكيفي) الذي يعمل على تحديد اسلوب التفكير والمفضل لكل فرد وتاثيره في تعلم مهارة الطبطبة للطالبات، اذ يعمل على ايصال المعلومات والافكار الخاصة باداء المهارة وحس

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Treatment with Dielectric Barrier Discharge (DBD) plasma restricts Aspergillus niger growth isolated from wheat grain
...Show More Authors

Microbiological contamination by fungi impacts the quality and safety of wheat grain storage. This study aimed to evaluate the efficacy of cold plasma in restricting the growth of the fungus, Aspergillus niger, which was isolated from wheat grains. A dielectric barrier discharge (DBD) operating at atmospheric pressure generated cold plasma that was used to treat the fungus, and the impact of this treatment was investigated at various periods  1, 2, 4, 6, and 15 minutes. The results revealed a highly significant decrease in the growth and number of spores of Aspergillus niger compared to the controls. This study revealed an efficient technique for enhancing wheat grain storage that could be a foundation for further large-scale studies.

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of the Portal System in Achievement Motivation and Cognitive of Fifth Grad Students in Geographic Literary Material
...Show More Authors

The study aimed to identify the impact of the use of systemic approach in the collection of geographical material and cognitive motivation when fifth grade students of literary, experimental design researcher adopted a partial seizures, and telemetric to two unequal one experimental and the other officer.
The sample consisted of fifth grade literary students from secondary (inherent) for Boys in Baghdad (the Republic of Iraq. (By Mjootain, and the number of students of each group (30 students). And has rewarded the two groups, in the variables (chronological age, average scores half-year, degree IQ),
Promising researcher himself requirements of research to determine the scientific material and teaching plans and the formulation of

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر استخدام الأسئلة التحضيرية في تنمية الثقة بالنفس عند طالبات الصف الثاني متوسط في مادة التاريخ
...Show More Authors

    The world witnessed variables influenced on entirely education essential mean  to grantee the required adaption  of  inner  and external motivations circumstances   this gives us opportunity of  the best selection means to achieve the goals  for progress individual and community  .                        

 From here appeared the needs of  scientific study  interest in  new styles of education locate the old place that  become non able to  granting  students  and their tendency  n

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Optimal Dimensions of Small Hydraulic Structure Cutoffs Using Coupled Genetic Algorithm and ANN Model
...Show More Authors

A genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Optimal Location of Static Synchronous Compensator (STATCOM) for IEEE 5-Bus Standard System Using Genetic Algorithm
...Show More Authors

Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref