Preferred Language
Articles
/
ijs-401
Robust and Efficient Dynamic Stream Cipher Cryptosystem
...Show More Authors

In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.

We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2020
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Analysis and testing of the most important factors affecting (COVID-19)
...Show More Authors

Factor analysis is distinguished by its ability to shorten and arrange many variables in a small number of linear components. In this research, we will study the essential variables that affect the Coronavirus disease 2019 (COVID-19), which is supposed to contribute to the diagnosis of each patient group based on linear measurements of the disease and determine the method of treatment with application data for (600) patients registered in General AL-KARAMA Hospital in Baghdad from 1/4/2020 to 15/7/2020. The explanation of the variances from the total variance of each factor separately was obtained with six elements, which together explained 69.266% of the measure's variability. The most important variable are cough, idleness, fever, headach

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Sciences Journal Of Physical Education
The effect of using intellectual map according to the feedback (verbally and writhingly ) in the learning some skills of floor exercises in the women's artistic gymnastics
...Show More Authors

Abstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection

... Show More
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Laplace Distribution And Probabilistic (bi) In Linear Programming Model
...Show More Authors

The theory of probabilistic programming  may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, pro­duction and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Speech Signal Compression Using Wavelet And Linear Predictive Coding
...Show More Authors

A new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th

... Show More
View Publication Preview PDF
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation and Study of Gamma ray Attenuation Coefficients for Different Composites
...Show More Authors

In this work, the total linear attenuation coefficients µ(cm
-1
) were calculated and studied
for particulate reinforced polymer-based composites. Unsaturated polyester (UP) resin was
used as a matrix filled with different concentrations of Al, Fe, and Pb metal powders as
reinforcements. The effect of the metal powders addition at different weight percentages in
the range of (10,20,30,40,50)wt % and gamma energy on attenuation coefficients was studied.
The results show, as the metallic particulates content increase, the attenuation coefficients will
increase too, while it, were exhibited a decrease in their values when the gamma energy
increase.The total linear attenuation coefficients of gamma ray fo

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Ocean Engineering
Stresses and pore water pressure induced by machine foundation on saturated sand
...Show More Authors

In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Practice and Opinion of Doctors in Primary Health Care Centers Toward Referral System: Samples from Nine Governorates in Iraq
...Show More Authors

Background: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.

Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.

Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Chemistryopen
Bonding, Aromaticity and Isomerization of Furfuraldehyde through <i>Off</i> ‐Nucleus Isotropic Magnetic Shielding
...Show More Authors

Off-nucleus isotropic magnetic shielding (σiso(r)) and multi-points nucleus independent chemical shift (NICS(0-2 Å)) index were utilized to find the impacts of the isomerization of gas-phase furfuraldehyde (FD) on bonding and aromaticity of FD. Multidimensional (1D to 3D) grids of ghost atoms (bqs) were used as local magnetic probes to evaluate σiso(r) through gauge-including atomic orbitals (GIAO) at density functional theory (DFT) and B3LYP functional/6-311+G(d,p) basis set level of theory. 1D σiso(r) responses along each bond of FD were examined. Also, a σiso(r) 2D-scan was performed to obtain σiso(r) behavior at vertical heights of 0–1 Å above the FD plane in its cis, transition state (TS) and trans forms. New techniques fo

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
SMS Spam Detection Using Multiple Linear Regression and Extreme Learning Machines
...Show More Authors

     With the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper,  presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref