Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Study the Structural Properties of Porous Silicon and their Applications as Thermal Sensors
...Show More Authors

The photo-electrochemical etching (PECE) method has been utilized to create pSi samples on n-type silicon wafers (Si). Using the etching time 12 and 22 min while maintaining the other parameters 10 mA/cm2 current density and HF acid at 75% concentration.. The capacitance and resistance variation were studied as the temperature increased and decreased for prepared samples at frequencies 10 and 20 kHz. Using scanning electron microscopy (SEM), the bore width, depth, and porosity % were validated. The formation of porous silicon was confirmed by x-ray diffraction (XRD) patterns, the crystal size was decreased, and photoluminescence (PL) spectra revealed that the emission peaks were centered at 2q of 28.5619° and 28.7644° for et

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Is it Time to Develop Government Communication Functions?
...Show More Authors

Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
A critical reading of the artworks of Saudi artists through the theory of Erwin Panofsky
...Show More Authors

This study deals with the subject of art criticism by using Erwin Panofsky's theory to analyze a few Saudi artists' works. The study aims to identify Panofsky's theory and provide criticism of some Saudi artworks using it. The importance of the study is that it enriches the field of art criticism in the Kingdom of Saudi Arabia and helps critics and artists in using Panofsky’s theory to analyze artworks.
The study sample consists of six artworks produced in 2021 by six contemporary Saudi artists. In the theoretical section, the study dealt with several topics; first, is art criticism, the second part presents Panofsky’s theory with its three stages, the final part deals with the beginning of Saudi art until present time and its

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Theoretical Study and calculation The cold Reaction Rate of Deuteron Fusion In Nickel Metal Using Bose–Einstein Condensate Theory
...Show More Authors

In this paper, we focused on the investigated and studied the cold fusion reaction rate for D-D using the theory of Bose-Einstein condensation and depending on the quantum mechanics consideration. The quantum theory was based on the concept of single conventional of deuterons in Nickel-metal due to Bose-Einstein condensation, it has supplied a consistent description and explained of the experimental data. The analysis theory model has capable of explaining the physical behaviour of deuteron induced nuclear reactions in Nickel metals upon the five-star matter, it's the most expected for a quantitative predicted of the physical theory. Based on the Bose-Einstein condensation theorem formulation, we calculation the cold fusion reaction rate fo

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
The Counselor Brent Scowcroft and his Role in Achieving the Requirements of the American National Security
...Show More Authors

       Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 27 2023
Journal Name
Journal Of Kufa For Chemical Sciences
Nanogold-Bound Copper Complexes and Their Various Applications: A Review Article
...Show More Authors

The term "nano gold," also known as "gold nanoparticles," is commonly used. These particles are extremely small, with a diameter of less than 100 nm, which is only a fraction of the width of a human hair. Due to their tiny size, nano gold particles are often found in a colloidal solution, where they are suspended in a liquid stabilizer. This colloidal gold is essentially another name for nano gold. The main method for producing gold nanoparticles in a colloidal solution is the citrate synthesis technique, which involves combining different solutions to precipitate the gold nanoparticles. In biological systems, copper complexes play a significant role at the active sites of many metalloproteins. These complexes have potential applications in

... Show More
Publication Date
Mon Jan 20 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Nanogold-Bound Copper Complexes and Their Various Applications: A Review Article
...Show More Authors

View Publication
Publication Date
Sat Jan 22 2022
Journal Name
Aip Conference Proceedings 2437, 020032
Study and preparation of optoelectronic properties of AgAl1-xInxSe2/Si heterojunction solar cell applications
...Show More Authors

􀀤􀁅􀁖􀁗􀁕􀁄􀁆􀁗􀀑􀀃􀀬􀁑􀀃􀁗􀁋􀁌􀁖􀀃􀁕􀁈􀁖􀁈􀁄􀁕􀁆􀁋􀀏􀀃􀀤􀁊􀀤􀁏􀀔􀀐􀁛􀀬􀁑􀁛􀀶􀁈􀀕􀀃􀀋􀀤􀀤􀀬􀀶􀀌􀀃􀁆􀁒􀁐􀁓􀁒􀁘􀁑􀁇􀀃􀁄􀁏􀁏􀁒􀁜􀁖􀀃􀁓􀁕􀁈􀁓􀁄􀁕􀁈􀁇􀀃􀁉􀁒􀁕􀀃􀁇􀁌􀁉􀁉􀁈􀁕􀁈􀁑􀁗􀀃􀁛􀀃􀀋􀀓􀀑􀀖􀀏􀀃􀀓􀀑􀀙􀀃􀁄􀁑􀁇􀀃􀀓􀀑􀀜􀀌􀀃􀁅􀁜􀀃􀁐􀁈􀁏􀁗􀁌􀁑􀁊􀀃 􀁗􀁋􀁈􀁐􀀃 􀁌􀁑􀀃 􀁄􀁑􀀃 􀁈􀁙􀁄􀁆􀁘􀁄􀁗􀁈􀁇􀀃 􀁔􀁘􀁄􀁕􀁗􀁝􀀃 􀁗􀁘􀁅􀁈􀀃 􀀋􀀕􀀑􀀘􀀍􀀔􀀓􀀐􀀖􀀃 􀁗􀁒􀁕􀁕􀀌􀀑􀀃 􀀤􀀤􀀬􀀶􀀃 􀁚􀁌􀁗􀁋􀀃 􀁇􀁌􀁉􀁉

... Show More
Preview PDF