Preferred Language
Articles
/
iEKfUpoBMeyNPGM3bMCx
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Wed Apr 26 2023
Journal Name
Journal Of Contemporary Medical Sciences
A potential role of extracellular DNA in biofilm and ciprofloxacin resistance
...Show More Authors

Objectives: This study aims to broaden our knowledge of the role of eDNA in bacterial biofilms and antibiotic-resistance gene transfer among isolates. Methods: Staphylococcus aureus, E. coli, and Pseudomonas aeruginosa were isolated from different non-repeated 170 specimens. The bacterial isolates were identified using morphological and molecular methods. Different concentrations of genomic DNA were tested for their potential role in biofilms formed by study isolates employing microtiter plate assay. Ciprofloxacin resistance was identified by detecting a mutation in gyrA and parC. Results: The biofilm intensity significantly decreased (P < 0.05) concerning S. aureus isolates and insignificantly (P > 0.05) concernin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Mar 03 2021
Journal Name
Innovative Infrastructure Solutions
Experimental investigation of a new sustainable approach for recycling waste styrofoam food containers in lightweight concrete
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Al-mustansiriyah Journal Of Science
Encrypting a Text by Using Affine Cipher and Hiding it in the Colored Image by Using the Quantization stage
...Show More Authors

ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013

View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Hybrid Transform Based Denoising with Block Thresholding
...Show More Authors

A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Thermal Properties of Lead-Acid Battery Plastic Lightweight Concrete
...Show More Authors

This study investigates the possibility of using waste plastic as one of the components of expired lead-acid batteries to produce lightweight concrete. Different percentages of lead-acid battery plastic were used in the production of lightweight concrete. The replacements were (70, 80 and 100%) by volume of the fine and coarse aggregate. Results demonstrated that a reduction of approximately 23.6% to 35% in the wet density was observed when replacement of 70% to 100% of the natural aggregate by lead-acid battery plastic. Also, the compressive strength decreased slightly with the increase in plastic content at different curing ages of 7, 28, 60, 90, 120 days. The lowest value of compressive strength was (20.7 MPa) for (wa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref