Preferred Language
Articles
/
ijs-497
Proposal Hybrid CBC Encryption System to Protect E-mail Messages
...Show More Authors

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Alternative distribution to estimate the Dose – Response model in bioassay excrement
...Show More Authors

 Alternative  distribution  to estimate the Dose – Response  model in bioassay  excrement

This research   concern to study five different distribution (Probit , Logistic, Arc sine , extreme value , One hit  ), to estimate  dose –response model by using m.l.e  and probit method This is done by determining different  weights in each  distribution in addition find all particular statistics for vital model . 

View Publication Preview PDF
Crossref
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study to the Main Effects on the Auger de-excitation Transition
...Show More Authors

  An Eigen-state expansion method is applied to the transition of the Auger de-excitation charge transfer (AD) process in the interaction between clean Cu,Al and Na surfaces and excited incident gases H and He .We use this method to describe the effective surfaces electronic structure. It's shown that the AD efficiency is deeply influenced by the presence of the energy band for the surfaces and the potential energy stored within the excited incident atom, thus for long interaction time we use a slowly atom's about 1KeV to scatter from metals surfaces where the electron couldn't probe the metal band structure and Za the surface - projectile distance. Also we drive a new formula for AD interaction Matrix element

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
Contributions to Iraqi Children Press in Promoting Educational Values in Children
...Show More Authors

The researcher aims at focusing on the participations of children journalism in supplying the educational values for them. The researcher uses the survey method in addition to the method of content analysis through analyzing the content of two journals (Majalati and The Mezmar). Both of them deal with children issues.

         The researcher concludes that the two journals focus on literary arts in a way which surpasses the journalistic arts. Furthermore, the two journals have concerned with showing the positive values as well as insuring the necessity of rectifying the wrong behaviors. Finally, the researcher recommends that it is necessary to improve the employees who work with children j

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Family Dialogue of Kindergarten’s Parents and its Relation to Children’s Fears
...Show More Authors

The research aims at Identifying family dialogue of kindergarten’s parents. 2)  Exploring the fears that kindergarteners suffer from. 3) Identifying family dialogue of kindergarteners’ parents and the fears of their children. To achieve the aim of the research, the researcher designed two scales: one for the family dialogue of kindergarteners’ parents, and the other for the fears of the kindergarten’s child. To identify the relationship between these two elements, the scale subjected to the consultation of a group of specialized expertise in educational and psychological sciences to certify the propriety of the items. The reliability of the scale of the family dialogue recorded (0.85). As for the scale of children’

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Using Backpropagation to Predict Drought Factor in Keetch-Byram Drought Index
...Show More Authors

Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
PROTOTYPING TO DESIGN AN ANAGLYPH 3D IMAGE BASED ON WATERFALL MODEL
...Show More Authors

In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.

View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Study of Fatigue Crack Growth to 2SiC3Ti Generalized Paris Equation)
...Show More Authors

    A theoretical study was done in this work for Fatigue. Fatigue Crack Growth (FCG) and stress factor intensity range for Ti2 SiC 3 .  It also includes Generalized Paris Equation and the Fulfillment of his equation which promise that there is a relation between parameters C and n.          Simple Paris Equation was used through which we concluded the practical values of C and n and compared them with the theoretical values which have been concluded by Generalized Paris Equation.           The value of da/dN and ∆K for every material and sample were concluded and compared with the data which was used in the computer p

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Manifestation and response of Laryngopharygeal reflux to treatment in Kurdistan -IRAQ
...Show More Authors

BACKGROUND: In 1972 complete description of the
inflammation of posterior third of the vocal cords was
done, with barium swallow confirming Gastro
Esophageal Disease [CRED] & subsequent successful
symptomatic treatment with antacid. The possible
association between GERD & chronic laryngitis was
initially known as acid laryngitis .2
*from the Department of ENT, Hawlear Medical College, Hawlear university. Department of ENT, Rezgary Teaching Hospital, Erbil.
Correspondence to :
Dr.Said Mustafa Said
Corespondence Address to : Dr.Said Mustafa Said _ E- mail: Email [email protected] Mob. 07504563829
Recived at : 15 th Dec 2009 Accepted at : 3ed Nov 2010

OBJECTIVE: To record the common presentat

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Feature Extraction in Six Blocks to Detect and Recognize English Numbers
...Show More Authors

    The Fuzzy Logic method was implemented to detect and recognize English numbers in this paper. The extracted features within this method make the detection easy and accurate. These features depend on the crossing point of two vertical lines with one horizontal line to be used from the Fuzzy logic method, as shown by the Matlab code in this study. The font types are Times New Roman, Arial, Calabria, Arabic, and Andalus with different font sizes of 10, 16, 22, 28, 36, 42, 50 and 72. These numbers are isolated automatically with the designed algorithm, for which the code is also presented. The number’s image is tested with the Fuzzy algorithm depending on six-block properties only. Groups of regions (High, Medium, and Lo

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co

... Show More
View Publication Preview PDF
Crossref