Preferred Language
Articles
/
ijs-7098
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree of protection to secure personal user transactions by creating secure keys that can be used for insecure channels.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 07 2022
Journal Name
في مجلة الدراسات الللغوية والترجمية
Semantic and cultural analysis of phraseological units with the names of wild animals in Russian and Arabic
...Show More Authors

Summary:This article discusses the topic of phraseological units with the names of wild animals in the Russian and Arabic languages in the aspect of their comparative semantic and cultural analysis, since a comparative analysis of the meanings of phraseological units of the Arabic and Russian languages, detection of coincidences and differences in the compared languages, is an important method for studying linguoculturology, since phraseological units represent a reflection of culture in the language

Preview PDF
Publication Date
Fri Jul 19 2024
Journal Name
Известия Юго-Западного государственного университета. Серия: Лингвистика и педагогика
ACOMPARATIVE ANALYSIS OF THE CONCEPT AND TYPES OF pun IN RUSSIAN AND ARABIC
...Show More Authors

Abstract Purpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts. Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered, and cultural f

... Show More
Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
W-Closed Submodule and Related Concepts
...Show More Authors

    Let R be a commutative ring with identity, and M be a left untial module. In this paper we introduce and study the concept w-closed submodules, that is stronger form of the concept of closed submodules, where asubmodule K of a module M is called w-closed in M, "if it has no proper weak essential extension in M", that is if there exists a submodule L of M with K is weak essential submodule of L then K=L. Some basic properties, examples of w-closed submodules are investigated, and some relationships between w-closed submodules and other related modules are studied. Furthermore, modules with chain condition on w-closed submodules are studied.   

View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Diversity of Heamatogenetic Markers in Kirkuk Population
...Show More Authors

  Immuno-haematological genetic markers study was carried out to understand the genetic background variations among Kirkuk (Iraq) indigenous population. A cross-sectional study of 179 patients with thalassemia major was conducted in Kirkuk. A detailed review was undertaken to define the relationships between ethnic origins, phenotype and immuno-genetic markers uniformity in relation to genetic isolation and interethnic admixture. A total of 179 thalassemia major patients were subjected to analysis in the hereditary blood diseases centre, including (18(10.05 %)) of intermarriages between different ethnic groups origin, whereas the overall consanguinity marriage rate was estimated at (161 (89.9%)) including (63(35.1%)) for first cousi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Comparison of Some of Estimation methods of Stress-Strength Model: R = P(Y < X < Z)
...Show More Authors

In this study, the stress-strength model R = P(Y < X < Z)  is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used    to estimate the parameters  namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.  

View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
"Khurasan statehood" : new centralization of ISIS and limits of incursion and development
...Show More Authors

Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 02 2022
Journal Name
Al-manhaj
Mathematical Statistics - Second Edition
...Show More Authors

This Book is the second edition that intended to be textbook studied for undergraduate/ postgraduate course in mathematical statistics. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces events and probability review. Chapter Two devotes to random variables in their two types: discrete and continuous with definitions of probability mass function, probability density function and cumulative distribution function as well. Chapter Three discusses mathematical expectation with its special types such as: moments, moment generating function and other related topics. Chapter Four deals with some special discrete distributions: (Discrete Uniform, Bernoulli, Binomial, Poisson, Geometric, Neg

... Show More
Preview PDF