Preferred Language
Articles
/
bsj-5256
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and in-vitro Evaluation of Carvedilol Gastroretentive Capsule as (Superporous Hydrogel)
...Show More Authors

  The preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.

The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.

 Sixteenth formulae of SPH h

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Abu Izac Al-Zauali (d.616 A.H) His life and what Existed of his poetry
...Show More Authors

 

   The aim of this research is to identify the Andalusia  poet  Abu Izac Al-Zauali , whose  most of his poetry and biography had been lost, as well as many Andalusia  poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry  and to document his poetry as other  writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .

Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).

View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Lxxvi Международная научно-практическая конференция «Научный форум: филология, искусствоведение и культурология»
Comparative analysis of the concept and types of homonyms in Russian and Arabic
...Show More Authors

Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Optimal characteristics of wind turbine to maximize capacity factor
...Show More Authors

The capacity factor is the main factor in assessing the efficiency of wind Turbine. This paper presents a procedure to find the optimal wind turbine for five different locations in Iraq based on finding the highest capacity factor of wind turbine for different locations. The wind data for twelve successive years (2009-2020) of five locations in Iraq are collected and analyzed. The longitudes and latitudes of the candidate sites are (44.3661o E, 33.3152o N), (47.7738o E, 30.5258o N), (45.8160o E, 32.5165o N), (44.33265o E, 32.0107o N) and (46.25691o E, 31.0510o N) for Baghdad, Basrah, Al-Kut, Al-Najaf, and Al-Nasiriyah respectively. The average wind velocity, standard deviation, Weibull shape and scale factors, and probability density functi

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (10)
Scopus
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Effect of laser process an inclined surface cutting of mild steel then analysis data statistically by RSM
...Show More Authors

The regression analysis process is used to study and predicate the surface response by using the design of experiment (DOE) as well as roughness calculation through developing a mathematical model. In this study; response surface methodology and the particular solution technique are used. Design of experiment used a series of the structured statistical analytic approach to investigate the relationship between some parameters and their responses. Surface roughness is one of the important parameters which play an important role. Also, its found that the cutting speed can result in small effects on surface roughness. This work is focusing on all considerations to make interaction between the parameters (position of influenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
THE EFFECT OF CUTOFF WALL ANGLE ON SEEPAGE UNDER DAMS
...Show More Authors

Flow of water under concrete dams generates uplift pressure under the dam, which may cause the dam to function improperly, in addition to the exit gradient that may cause piping if exceeded a safe value. Cutoff walls usually used to minimize the effect of flow under dams. It is required to
1)minimize the flow quantity to conserve water in the reservoir, it is also required to
2)minimize the uplift pressure under the dam to maintain stability of the dam, and it is required to

3) minimize the exit gradient to prevent quick condition to occur at the toe of the dam where piping may occur and may cause erosion of the soil. Varying the angle of cutoff walls affects its influence on the factors aforementioned that are required to

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Simulation of Heat Storage and Heat Regeneration in Phase Change Material
...Show More Authors

The present study explores numerically the energy storage and energy regeneration during Melting and Solidification processes in Phase Change Materials (PCM) used in Latent Heat Thermal Energy Storage (LHTES) systems. Transient two-dimensional (2-D) conduction heat transfer equations with phase change have been solved utilizing the Explicit Finite Difference Method (FDM) and Grid Generation technique. A Fortran computer program was built to solve the problem. The study included four different Paraffin's. The effects of container geometrical shape, which included cylindrical and square sections of the same volume and heat transfer area, the container volume or mass of PCM, variation of mass flow rate of heat transfer fluid (HTF), and temp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref