Preferred Language
Articles
/
ijs-552
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Liquid-Liquid Equilibria of N-Methylpyrrolidone and Hydrocarbon
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Electrical Investigation of PSi/Si (n-type) structure
...Show More Authors

In this work, porous Silicon structures are formed with photochemical etching process of n-type Silicon(111) wafers of resistivity (0.02.cm) in hydrofluoric acid (HF) of concentration (39%wt) under light source of tungeston halogen lamp of (100 Watt) power. Samples were anodized in a solution of 39%HF and ethanol at 1:1 for 15 minutes. The samples were realized on n-type Si substrates Porous Silicon layers of 100m thickness and 30% of porousity. Frequency dependence of conductivity for Al/PSi/Si/Al sandwich form was studied. A frequency range of 102-106Hz was used allowing an accurate determination of the impedance components. Their electronic transport parameters were determined using complex impedance measurements. These measu

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Sum of Squares of ‘n’ Consecutive Carol Numbers
...Show More Authors

The discussion in this paper gives several theorems and lemmas on the Sums of Squares of  consecutive Carol Numbers. These theorems are proved by using the definition of carol numbers and mathematical induction method. Here the matrix form and the recursive form of sum of squares of  consecutive Carol numbers is also given. The properties of the Carol numbers are also derived.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 19 2024
Journal Name
Chemical Papers
Hydroisomerization of n-hexane over Pt/TiO2 catalysts
...Show More Authors

One of the most important processes to obtain gasoline with high octane numbers is isomerization. In this paper, Pt/TiO2 was prepared successfully by using the sol–gel method by hydrolysis of titanium tetraisopropoxide as a titania source with ethanol and then platinum was loaded on the synthesized catalyst; the result shows that the sample prepared has a good crystallinity with a surface area of about 85 m2 /g and a pore volume of 0.1938 cm3 /g, while XRD shows that the prepared sample was anatase phase. The efect of both temperature and liquid hourly space velocity of the prepared catalyst was achieved by hydroisomerization of n-hexane in a fxed bed reactor with a temperature of 200–275 °C and LHSV 0.5–2h−1. The results show

... Show More
View Publication
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA
...Show More Authors

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Chem Istry & Chem Ical Technology
SYN TH ESIS, CH ARACTERIZATION AN D AN TIM ICROBIAL ACTIVITY OF N EW N UCLEOSIDE AN ALOGUES FROM BEN ZOTRIAZOLE
...Show More Authors

Novel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b

... Show More
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Conclusion Empirical Equations of Asymmetry Parameter for Magic Nuclei in N for()α,n Reaction of Incident Neutron Energy (14.5 MeV)
...Show More Authors

In this study, the magic nuclei is divided into two groups, one of them is light group and the other is middle group, it was calculated shell corrections for all nuclei, and also it was concluded the relationship between cross sections for nuclear reactions ()α,n and the mass number (A) for all nuclei to incident neutrons (14.5 MeV). We found empirical equations to asymmetry parameter (N-Z)/A as function of mass number and for that two groups: for A=38 to A=40 light nuclei.()0534.10263.0+−=−AAZN for A=50 to A=89 middle nuclei. ()408.00151.00001.02−+=−AAAZN for A=90 to A=144 middle nuclei. ()0711.10221

View Publication Preview PDF
Publication Date
Tue Oct 04 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF