Preferred Language
Articles
/
ijs-552
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of the Genetic Toxicity of Aqueous and Alcoholic Extracts of Seeds of Peganum harmala L. on Onion root (Allium cepa L.)
...Show More Authors

The genetic toxicity of aqueous and alcoholic extracts of seeds of Peganum harmala L. was evaluated on the onion roots ,using  concentrations 10,25,50,100 and 200 % w/v of extracts and periods of exposure 24,48 and 74 hours. The results indicated that the Peganum harmala significantly decreased root growth rate of onion root at all concentrations and treatment periods in comparison to the control ,  the growth of the root decreased when increasing the extract concentration.The EC50value  of aqueous extracts was 50% and for alcohol extract was 25% ,thus the alcohol extract was most effective in the growth rate of the roots from the aqueous extract. The results also indicated that the mitotic index of Allium cepa was signifi

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Tropical Journal Of Natural Product Research
Genetic Association of Angiotensin-converting enzyme 2 ACE-2 (rs2285666) Polymorphism with the Susceptibility of COVID-19 Disease in Iraqi Patients
...Show More Authors

Significant risks to human health are posed by the 2019 coronavirus illness (COVID-19). SARS coronavirus type 2 receptor, also known as the major enzyme in the renin-angiotensin system (RAS), angiotensin-converting enzyme 2 (ACE-2), connects COVID-19 and RAS. This study was conducted with the intention of determining whether or not RAS gene polymorphisms and ACE-2 (G8790A) play a part in the process of predicting susceptibility to infection with COVID-19. In this study 127 participants, 67 of whom were deemed by a physician to be in a severe state of illness, and 60 of whom were categorized as "healthy controls" .The genetic study included an extraction of genomic DNA from blood samples of each covid 19 patients and healthy control

... Show More
View Publication
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Cancer Epidemiology
The association of combined GSTM1, GSTT1, and GSTP1 genetic polymorphisms with lung cancer risk in male Iraqi Waterpipe Tobacco (Nargila) smokers
...Show More Authors

Mutations in genes encoding proteins necessary for detoxifying oxidative stress products have been predicted to increase susceptibility to lung cancer (LC). Despite this, the association between waterpipe tobacco smoking (WP), genetic polymorphisms, and LC risk remains poorly understood. This is the first study to explore the relationship between WP tobacco smoking and these genetic factors. Previously, we investigated the association of GSTP1 SNPs (rs1695-A/G and rs1138272-C/T) with LC in Iraqi males who smoke WP. Here, we expanded our analysis to include GSTM1 (active/null) and GSTT1 (active/null) genotypes, both individually and in combination with GSTP1 SNPs. Multiplex PCR and RFLP-PCR assays were utilized to determine the genotypes of

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
The L^P-spaces of functions from the n-dimensional real space to the N-dimensional quaternionic space
...Show More Authors

     In this paper, we introduce new definitions of the - spaces  namely the    - spaces  Here,  and  are natural numbers that are not necessarily equal, such that . The space  refers to the n-dimensional Euclidean space,  refers to the quaternions set and  refers to the N-dimensional quaternionic space. Furthermore, we establish and prove some properties of their elements. These elements are quaternion-valued N-vector functions defined on , and the  spaces  have never been introduced in this way before.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Non-Resonant Reaction Rates of 13C(α,n)16O and 22Ne(α,n)25Mg reactions in AGB Stars
...Show More Authors

Both 13C 16O and 22Ne 25Mg reactions perform a cosmic role in the production of neutrons in AGB stars, which significantly contributes to the nucleosynthesis via the s-process. The astrophysical S-factor for both reactions is calculated in this research, utilizing EMPIRE code and depending on two parameter sets for the optical potential. These datasets were published earlier by McFadden and Satchler (denoted here as MFS) and Avrigeanu and Hodgson (denoted as AH) for the non-resonant region of the spectrum and over a temperature range of . The extrapolated S-factor at zero energy is derived to be  and  for 13C 16O, while the values were  and  fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Genetic characteristics and β-cell Autoimmunity in T1DM Children
...Show More Authors

Background: TIDM is known to be polygenic disease that appears from the interaction of mutation in multiple genes including HLA. The autoimmune mediated destruction of
pancreatic β-cells is reflected by the presence of autoantibodies against prominent antigens in the pancreatic β-cells.
Objective: This study was designed to investigate the role of HLA-class I and class II antigens in the etiology of type 1 diabetes mellitus (T1DM) and also assessment of
glutamic acid decarboxylase (GAD65) autoantibodies in the patients at the onset of the disease.
Patients & Methods: Sixty T1DM patients who were newly onset of the disease (diagnosed less than five months) were selected. Eighty apparently healthy

... Show More
View Publication Preview PDF
Crossref