Preferred Language
Articles
/
ijs-394
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 25 2024
Journal Name
Al–bahith Al–a'alami
New Recent Trends in Agenda Setting Studies n The Arab World
...Show More Authors

This study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Particle Swarm Algorithm to Solve Queuing Models with Practical Application
...Show More Authors

This paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six  employees , and it was chosen queuing model is a single-service channel  M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and  it was composed of data collection times (arrival time , service time, departure time)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
The Development of Semi – Empirical Relationship for the Determination of the Half –Lives of Even – Even Heavy Nuclei that Emit Alpha – Particles
...Show More Authors

The Development of Semi – Empirical Relationship for the Determination of the Half –Lives of Even – Even Heavy Nuclei that Emit Alpha – Particles

View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
The Ranking Function for Solving the Fuzzy Hotelling T2 Test
...Show More Authors

     A multivariate control chart is measured by many variables that are correlated in production, using the quality characteristics in any product. In this paper, statistical procedures were employed to find the multivariate quality control chart by utilizing fuzzy Hotelling  test. The procedure utilizes the triangular membership function to treat the real data, which were collected from Baghdad Soft Drinks Company in Iraq. The quality of production was evaluated by using a new method of the ranking function.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jan 11 2017
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6- bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide(L-AZ) .
...Show More Authors

The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i

... Show More
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A traditional model of translation: Critical analysis: Традиционные модели перевода: критический анализ
...Show More Authors

 

 The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.

Аннотация

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Development of Artificial Intelligence Models for Estimating Rate of Penetration in East Baghdad Field, Middle Iraq
...Show More Authors

It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy i

... Show More
Crossref