Preferred Language
Articles
/
ijs-6902
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encoding technique is used with the ECC for enhancing the security. The proposed model was compared to the existing model and found to be more efficient in terms of security. The proposed model ensure confidentiality with the encryption technique, Integrity by using the Hashing method, and authenticity and non-repudiationwith the utilization of digital signature.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
ההשפעה והשענוע בנאום הפוליטי של שמעון פרס עיון פרגמטי בדוגמאות נבחרות מנאומיו Effect and Persuasion in the Political Discourse of Shimon Peres A Pragmatic Study in Selected form of His Addresses
...Show More Authors

במחקר הזה ניתחנו מספר נאומים של שמעון פרס, אנחנו התמקדנו בהשפעה והשכנוע אצל שמעון פרס ואיך הוא יכול להעביר את המסרים של נאומיו בסגנון פרגמטי כדי להגיע ללבו של הציבור.

 גם כן, התמקדנו בסגנון הפוליטי שהוא חושב כי התחום הזה צריך להיות ברור מול הציבור וגם כן מול דעת הקהל הבינלאומי מתוך השימוש במונחים בעלי השפעה ושכנוע להגיע למטרות המבוקשות.

 במלים אחרות, שמעון פרס, לעתים, מתמקד בשפה מליצית ויעמוד הרב

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the internal fitness and marginal gap between single crowns and crowns within three-unite bridge of zirconia substructure fabricated by CAD-CAM system. (An In vitro study)
...Show More Authors

ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge we

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
The Q-switched Nd:YAG laser shock processing effects on mechanical properties of C86400 Cu-Zn alloy: Q-switched Nd:YAG laser shock processing effects on mechanical properties of C86400 Cu-Zn alloy
...Show More Authors

The aim of this paper is to investigate the effects of Nd:YAG laser shock processing (LSP) on micro-hardness and surface roughness of 86400Cu-Zn alloy. X-ray fluorescence technique was used to analyze the chemical composition of this alloy. LSP treatment was performed with a Q-switched Nd: YAG laser with a wavelength of 1064 nm. The results show that laser shock processing can significantly increase. The micro-hardness and surface roughness of the LSP-treated sample. Vickers diamond indenter was used to measure the micro-hardness of all samples with different laser pulse energy and the different number of laser pulses. It is found that the metal hardness can be significantly increased to more than 80% by increasing the laser energy and t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
udyStudyStudyStudyStudy of of the Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extract
...Show More Authors

The aim of current study is estimate the ability of low cost adsorbents, which consist of extracted silica from rice husk ash in treatment of Industrial waste water that contains heavy metals (Cd, Co and Pb) with other pollutants by fixed filters technique with determine the best method for that, and study the effect of a number of variables and parameters. This study involved one waste water samples were collected from. State battery manufacturing company (SBMC) (before treatment unit) at 5th and 22th, of the January 2015. Adsorption tests showed that all tested adsorbent materials had a significant heavy metal removal efficiency. pH values showed a significant impact on adsorption process, but best removal efficiency occurred at pH 4.5

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Real Time Wireless Monitoring and Controlling of 3-D Single Point Incremental Tool
...Show More Authors

Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Hybrid Images Compression and Transmitted Using MC-CDMA System
...Show More Authors

In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Neural Networks as a Discriminant Purposes
...Show More Authors

Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.

In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.  

 

 

View Publication Preview PDF
Crossref