Preferred Language
Articles
/
ijs-241
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Fri Nov 05 2021
Journal Name
Iraqi Journal Of Science
Splitting the e-Abacus Diagram in the Partition Theory

In the partition theory, there is more then one form of representation of dedication, most notably the Abacus diagram, which gives an accurate and specific description. In the year 2019, Mahmood and Mahmood presented the idea of merging more than two plans, and then the following question was raised: Is the process of separating any somewhat large diagram into smaller schemes possible? The general formula to split e-abacus diagram into two or more equal or unequal parts was achieved in this study now.

Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Aug 13 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of e-marketing on the quality of the insurance service: Applied research in the National Insurance Company

This research aims to introduce the importance of electronic marketing and the extent of its impact on the quality of the insurance service in general, and the national insurance company in particular, and the advantages it can achieve, an increase in its competitiveness, as well as contributing to increasing the efficiency of the performance of the insurance company.

The research relied on the questionnaire form as a main tool for obtaining data and information by the 70 questionnaire questionnaires required for the field side of the research, as they were distributed and retrieved in full, and all of them are suitable for analysis. The sample .The questionnaire was designed with three axes, the first wa

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 27 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Salivary vitamin E and uric acid in patients with OLP and healthy individuals

Background: Oral Lichen planus (OLP) is a T-cell mediated chronic inflammatory oral mucosal disease of unknown etiology. Recent studies have reported an increased oxidative stress and lipid peroxidation in such patients. This suggests that reactive oxygen species may have a role in the pathogenesis of lichen planus. Oxidative stress in OLP release molecules consisting of granzymes resulting in local tissue damage in the effectors. Antioxidants that can defend against oxidative stress in the body cells include enzymes, as well as non- enzymatic antioxidants, such as melatonin, uric acid, vitamin A and E. Purpose: To study the level of salivary vitamin E and uric acid as antioxidant agents in patients with OLP and compared with healthy con

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Palm Vein Recognition Based on Centerline

The palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Gait Recognition Based on Deep Learning

      In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF