Preferred Language
Articles
/
ijs-5481
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on the cloud, so that if someone gains access to the server, it would be unable to access the original information. Performance evaluation of the developed system is performed by comparing ECC with the RSA algorithm. The results show that the ECC method is more efficient than RSA when used to secure information in the cloud.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Spectrophotometric Determination of Micro Amount of Chromium (III) Using Sodium 4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate in the Presence of Surfactant, Study of Thermodynamic Functions and Their Analytical Applications
...Show More Authors

          Using sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III)  ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Feb 22 2025
Journal Name
Al.qadisiya Journal For The Sciences Of Physical Education
The Influence of Using Special Exercises with Weights to Develop Moments of Force to Some of the Striking Shoulder and Arm Muscles and Accuracy of the Skill of the Smash and Rectum in Volleyball
...Show More Authors

This research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force f

... Show More
View Publication
Publication Date
Sat Dec 24 2022
Journal Name
Journal Of The College Of Languages (jcl)
The role of presupposition in the interpretation of the Qur'anic letters (Sharif Morteza, Mullah Sadra and Gonabadi): بررسی تأثیر پیش فهم‌ها بر فهم مفسران از حروف مقطعه در قرآن (شریف مرتضی، ملاصدرا و گنابادی)
...Show More Authors

The mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Determination of hydrogen peroxide in some local pharmaceutical disinfectants by continuous flow injection analysis via turbidimetric (T180o) and scattered light effect at two opposite positions (2N90o ) using Ayah 4SW-3D-T180o -2N90o -Solar - CFI Analyse
...Show More Authors

An indirectly method is used to determine hydrogen peroxide. The method based on oxidation of chromium (III) ion by hydrogen peroxide in basic medium to form chromate ion which react with barium (II) ion to produce a yellow precipitate (BaCrO4). Under the optimum established conditions, the linear range of 0.50-25.00 mmol L-1 along with correlation coefficient (r) of 0.9992, Limit of detection (LOD) 0.68 μg / 100 μL, precision expressed as relative standard deviation for six replication measurements at 5.0 mmol.L-1 H2O2 of less than 2% were obtained for hydrogen peroxide. The developed method was successfully applied for the estimation of H2O2 in three pharmaceuticals preparation of different companies using continuous flow injection o

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
The Use of Social Networking sites in the Marketing of Values Analytical : Study of the Official Pages of the Ministry of Culture, Tourism and Antiquities and the Ministry of Labor and Social Affairs on Facebook
...Show More Authors

The social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.

   The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.

     The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree to which Arabic Language Teachers at the Secondary Stage Possess the Teaching Competencies Necessary to Develop the Literary Appreciation Skills of Their Students from the Point of View of Educational Leaders in Bisha Governorate
...Show More Authors

This study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Structure and optical properties of PANI/MWCNTs nanocomposites thin films prepared by plasma jet polymerization
...Show More Authors

Polyaniline Multi walled Carbon nanotubes (PANI/MWCNTs) nanocomposite thin films have been prepared by non-equilibrium atmospheric pressure plasma jet on glass substrate with different weight percentage of MWCNTs 1, 2, 3, 4%. The diameter of the MWCNTs was in the range of 8-55 nm and length - - 55 55 μm. the nanocomposite thin films were characterized by UV-VIS, XRD, FTIR, and SEM. The optical studies show that the energy band gap of PANI/MWCNTs nanocomposites thin films will be different according to the MWCNTs polyaniline concentration. The XRD pattern indicates that the synthesized PANI/MWCNTs nanocomposite is amorphous. FTIR reveals the presence of MWCNTs nanoparticle embedded into polyaniline. SEM surface images show that the MWCNT

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Molecular Detection of Enterotoxin Genes of Multiresistant Staphylococcus aureus Isolates from Different Sources of Food
...Show More Authors

Foodborne diseases are a major risk for human health. Millions of people become sick as a result of eating contaminated food with microorganisms that cause diseases. S.  aureus is considered as one of the most important pathogenic bacteria, having the ability to  activate certain genes that encode for heat stable enterotoxins and cause Staphylococcal food poisoning. Thus, this study aimed to determine the prevalence of multi resistant Staphylococcus aureus that produce enterotoxins in different sources of food . Forty nine isolates were identified as S.aureus, according to morphological and biochemical tests. They were isolated from 387 different food samples from several randomly covered restaurants

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref