Preferred Language
Articles
/
gxbpvYoBVTCNdQwCoKQX
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.

Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Antibacterial Activity of Three Algal Genera against some Pathogenic Bacteria
...Show More Authors

In the current study, three types of algae namely Tetradesmus nygaardi (MZ801740), Scenedesmus quadricauda (MZ801741) and Coelastrella sp (MZ801742) were extracted by 95% ethanol and hexane against two types of gram positive and two types of gram negative bacteria by wells diffusion methods. Eleven concentrations from the extract of algae (2, 5, 10, 15, 20, 25, 30, 35, 40, 45 and 50 mg/ml) were utilized. It was noticed that ethanolic extraction was more effective than hexane in Scenedesmus quadricauda than the two other mentioned algal species against all pathogenic bacteria, Acintobacter baumanii (ATCC: 19606), Klebsiella pneumonia (ATCC: 13883) Enterococcus faecalis (ATCC: 29212) and Staphylococc

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Sumer 2
Response of Three Citrus Rootstocks to Organic and Biological Fertilizers
...Show More Authors

This study was conducted in a lath house, Dept of Hort. and Landscape, College of Agricultural Engineering Sciences, Univ. During the 2021 growing season, Baghdad will investigate the influence of organic and Biological fertilizers on three Citrus rootstocks' growth and leaf mineral content. The first factor is the addition of liquid organic fertilizers Vit-Org (O) at three levels without addition (O0), soil addition at 10 ml.L-1 (O10) and soil addition at 20 ml.L-1 (O20). The second factor is the addition of nitrogen-fixing bacteria without addition (N1), add 30 ml.Transplant-1 of Azotobacter chroococcum (N2) and add 30 ml.Transplant-1 of Azospirillum brasilemse (N3). The third factor is three citrus rootstocks: sour orange (R1), R

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Three-Dimensional Explicit Finite Element Simulation of Piled-Raft Foundation
...Show More Authors

This paper aims to validate a proposed finite element model to be adopted in predicting displacement and soil stresses of a piled-raft foundation. The proposed model adopts the solid element to simulate the raft, piles, and soil mass. An explicit integration scheme has been used to simulate nonlinear static aspects of the piled-raft foundation and to avoid the computational difficulties associated with the implicit finite element analysis.

The validation process is based on comparing the results of the proposed finite element model with those of a scaled-down experimental work achieved by other researchers. Centrifuge apparatus has been used in the experimental work to generate the required stresses to simulate t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Three-dimensional printing applications in the neurosurgery: A pilot study
...Show More Authors

BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance Evaluation of Three Phase Spray Direct Contact Heat Exchanger
...Show More Authors

 

The present investigation deals with experimental study of three-phase direct-contact heat exchanger, for water-Freon R11 system, where water is the continuous phase (liquid) and Freon R11 (liquid-gas) is the dispersed phase. The test section consisted of a cylindrical Perspex column with inner diameter 8cm and 1.2m long, in which, water was to be confined. Liquid Freon R11 drops were injected into the hot water filled column, through a special design of distributors at the bottom of the column. The liquid Freon R11 drops rose on their way up and evaporated into two-phase bubbles at atmospheric pressure. The study was devoted to express the effect of process variables such as c

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties of the opening text between changing and collecting reading in poem (city without rain): The Difficulties of the opening text between changing and collecting reading in poem (city without rain)
...Show More Authors

Abstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Feb 01 2011
Journal Name
Iop Conference Series: Materials Science And Engineering
Contour extraction of echocardiographic images based on pre-processing
...Show More Authors

In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref