Preferred Language
Articles
/
ijs-367
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-BOX) base on the input key, shifting, chaotic theory (1D, 2D logistic map), and particle swarm algorithm. At the same time will be generated inverse of the table S-BOX through output of the S-BOX which will be generated from the suggestions above will return the values of the union of the row and the column for all the values generated for S-BOX. The S-BOX output is tested in several measurements represent (complexity, time, avalanche criterion, and balance) and the results show that any change in the input will change the output S-BOX also the proposed algorithm will be measured by the five statistical and NIST measurements all results will show a successful exception random excursions, random excursions variant (test not application ). The time needed to implement it requires only milliseconds and is approximated to the time taken for the original algorithm.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Predicting the Depositional Environments of Mishrif Formation from Seismic Isopach Map in the Dujaila Oil Field, Southeast-Iraq:
...Show More Authors

In this paper, we attempt to predict the depositional environments with associated lithofacies of the main reservoir of the late Cretaceous Mishrif carbonate Formation, depending on the analysis of the created seismic isopach map by integrating seismic and well data. The isopach map was created from a 3D-seismic reflection survey carried out at the Dujaila oil field in southeastern Iraq, which is of an area of 602.26 Km2, and integrated with the data of the two explored wells. Based on the interpretation of the seismic isopach map, the diagram of the 3D-depositional environment model of Mishrif Formation was constructed. It showed three distinguished depositional environments, which were graduated from a back reef lithofacies of a shallo

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS: SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS
...Show More Authors

The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Boundary Controllability of Nonlinear System in Quasi-Banach Spaces
...Show More Authors

Sufficient conditions for boundary controllability of nonlinear system in quasi-Banach spaces are established. The results are obtained by using the strongly continuous semigroup theory and some techniques of nonlinear functional analysis, such as, fixed point theorem and quasi-Banach contraction principle theorem. Moreover, we given an example which is provided to illustrate the theory.

View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Stereotypical Frames if the Image of Women in the Iraqi TV Drama after 2003
...Show More Authors

This study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Copulas in Classical Probability Sense
...Show More Authors

               Copulas are simply equivalent structures to joint distribution functions. Then, we propose modified structures that depend on classical probability space and concepts with respect to copulas. Copulas have been presented in equivalent probability measure forms to the classical forms in order to examine any possible modern probabilistic relations. A probability of events was demonstrated as elements of copulas instead of random variables with a knowledge that each probability of an event belongs to [0,1]. Also, some probabilistic constructions have been shown within independent, and conditional probability concepts. A Bay's probability relation and its pro

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Fuzzy Attribute Quality Control Charts with proposed Ranking Function
...Show More Authors

    The attribute quality control charts are one of the main useful tools to use in control of quality product in companies. In this paper utilizing the statistical procedures to find the attribute quality control charts for through fuzzified the real data which we got it from Baghdad Soft Drink Company in Iraq, by using triangular membership function to obtain the fuzzy numbers then employing the proposed ranking function to transform to traditional sample. Then, compare between crisp and fuzzy attribute quality control.

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Thermal Buckling of Angle-Ply Laminated Plates Using New Displacement Function
...Show More Authors

ABSTRACT

Critical buckling temperature of angle-ply laminated plate is developed using a higher-order displacement field. This displacement field used by Mantari et al based on a constant ‘‘m’’, which is determined to give results closest to the three dimensions elasticity (3-D) theory. Equations of motion based on higher-order theory angle ply plates are derived through Hamilton, s principle, and solved using Navier-type solution to obtain critical buckling temperature for simply supported laminated plates. Changing (α2/ α1) ratios, number of layers, aspect ratios, E1/E2 ratios for thick and thin plates and their effect on thermal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Design Sampling Plan when Life Time Follows Logistic Distribution
...Show More Authors

Design sampling plan was and still one of most importance subjects because it give lowest cost  comparing with others, time live statistical distribution should be known to give best estimators for  parameters of sampling plan and get best sampling plan.

Research dell with design sampling plan when live time distribution follow Logistic distribution with () as location and shape parameters, using these information can help us getting (number of groups, sample size) associated with reject or accept the Lot

Experimental results for simulated data shows the least number of groups and sample size needs to reject or accept the Lot with certain probability of

... Show More
View Publication Preview PDF
Crossref