Preferred Language
Articles
/
ijs-6902
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encoding technique is used with the ECC for enhancing the security. The proposed model was compared to the existing model and found to be more efficient in terms of security. The proposed model ensure confidentiality with the encryption technique, Integrity by using the Hashing method, and authenticity and non-repudiationwith the utilization of digital signature.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
نظرية المخاطر كأساس للمسؤولية الدولية عن أعمال مجلس الأمن المشروعة دولياً والمتسمة بخطورة استثنائية
...Show More Authors

     International responsibility rises against the United Nations Organization for the actions of the Security Council according to the theory of risks, in the event that ships, submarines and aircraft carriers that operate with nuclear energy are launched against countries that violate the provisions of Chapter VII the Charter  of the United Nations, considering that the Council's actions here are considered as internationally legitimate acts of exceptional risks that the Council may resort to it in order to ensure the speed and effectiveness referred to in Article (11 / Paragraph 2) of the charter and to keep pace with developments in modern technology.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Optical and Structural Properties of Titanium Dioxide Papered by DC Magneto-Sputtering as a NO2 Gas Sensor
...Show More Authors

 In this work, a reactive DC magnetron sputtering technique was used to prepare TiO2 thin films. The variation in argon and oxygen gases mixing ratios (4:1, 2:1, 1:1, 1:2, 1:4) was used to achieve optimal properties for gas sensing. In addition, an analysis of the optical XRD properties of TiO2 thin films is presented. High-quality and uniform nanocrystalline films were obtained at a working gas pressure of 0.25 mbar and  1:4 (Ar/O2) gas mixture. The optical properties showed a transparent thin film with uniform adherence to the substrate. The average transmission of the TiO2 films deposited on the glass substrates was higher than 95% over the range of 400 to 800 nm.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
D-shape Optical Fiber Development and Enhancement as a Refractive Indices Sensor Using Surface Plasmon Resonance
...Show More Authors

This article showcases the development and utilization of a side-polished fiber optic sensor that can identify altered refractive index levels within a glucose solution through the investigation of the surface Plasmon resonance (SPR) effect. The aim was to enhance efficiency by means of the placement of a 50 nm-thick layer of gold at the D-shape fiber sensing area. The detector was fabricated by utilizing a silica optical fiber (SOF), which underwent a cladding stripping process that resulted in three distinct lengths, followed by a polishing method to remove a portion of the fiber diameter and produce a cross-sectional D-shape. During experimentation with glucose solution, the side-polished fiber optic sensor revealed an adept detection

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Fabrication and Characterization of Gas Sensor from ZrO2: MgO Nanostructure Thin Films by R.F. Magnetron Sputtering Technique
...Show More Authors

Thin films ZrO2: MgO nanostructure have been synthesized by a radio frequency magnetron plasma sputtering technique at different ratios of MgO (0,6, 8 and  10)% percentage to be used as the gas sensor for nitrogen dioxide NO2. The samples were investigated by X-ray diffraction (XRD), atomic force microscopy (AFM), scanning electron microscopy (SEM), energy-dispersive X-ray (EDX) and sensing properties were also investigated. The average particle size of all prepared samples was found lower than 33.22nm and the structure was a monoclinic phase. The distribution of grain size was found lower than36.3 nm and uninformed particles on the surface. Finally, the data of sensing properties have been discussed, where the

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Galaxy Morphological Image Classification using ResNet
...Show More Authors

     Machine learning-based techniques are used widely for the classification of images into various categories. The advancement of Convolutional Neural Network (CNN) affects the field of computer vision on a large scale. It has been applied to classify and localize objects in images. Among the fields of applications of CNN, it has been applied to understand huge unstructured astronomical data being collected every second. Galaxies have diverse and complex shapes and their morphology carries fundamental information about the whole universe. Studying these galaxies has been a tremendous task for the researchers around the world. Researchers have already applied some basic CNN models to predict the morphological classes

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Evaluation of Baghdad water quality using Fuzzy logic
...Show More Authors

Fuzzy measures are considered important tools to solve many environmental problems. Water pollution is one of the environmental problems, which has negatively effect on the health of consumers. In this paper, a mathematical model is proposed to evaluate water quality in the distribution networks of Baghdad city. Fuzzy logic and fuzzy measures have been applied to evaluate water quality with respect to chemical and microbiological contaminants. Our results are evaluate water pollution of some chemical and microbiological contaminants, which are difficult to evaluation through traditional methods.

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref