Preferred Language
Articles
/
gBh1OpYBVTCNdQwC0YIR
Attention enhancement system for college students with brain biofeedback signals based on virtual reality
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Computing And Digital Systems
Human Identification Based on SIFT Features of Hand Image
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Derivatives Based on 4, - Dimercaptobiphenyl
...Show More Authors

Starting from 4, - Dimercaptobiphenyl, a variety of phenolic Schiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis all analysis were performed in center of consultation in Jordan Universty.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Manual proposal to audit the automated accounting system in accordance with the framework (COBIT): Applied Research in the General Company for Petrochemical Industries
...Show More Authors

The information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-kut University College Of Humanities
The values ​​of environmental sustainability among the student-teacher at the College of Education for Pure Sciences, Ibn al-Haytham
...Show More Authors

Preview PDF
Publication Date
Fri Nov 03 2023
Journal Name
Journal Of Namibian Studies
Consciousness of Green Nanotechnology among Chemistry Scholars at the College of Education for Pure Sciences - Ibn Al-Haitham in Iraq
...Show More Authors

The study's objective is to find out the difference between the scholar of the research sample in awareness Green nanotechnology on the scaleas a whole and in each of its fields. The research depended of (136) specimen mem and women scholars of the fourth stage scholars / Department of Chemistry at the College of Education for Pure Sciences / Ibn Al-Haytham in Iraq for (2022-2023 AD) for the morning and evening studies, (65%) of the scientific community, It was picked at random with relation to the research instrument. it was a measure of awareness of green nanotechnology of (40) items, distributed in three areas (cognitive, skillful, emotional), and its validity and reliability were verified. Data analysis was completed for utilizing the s

... Show More
Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Namibian Studies
consciousness of green nanotechnology among chemistry scholers at the College of Education for Pure Sciences, Ibn al-Haytham in Iraq
...Show More Authors

Preview PDF