Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Balancing the Multi Assembly line Using Ranked Positional Weight and COMSOAL Algorithms: Case Study at the Sewing line Factory (7) /the General Company for Leather Industries (GCLI/ Baghdad)
...Show More Authors

      The problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Depositional Environment of the Gercus Formation in Jabal Haibat Sultan, NE Iraq; New Sedimentological Approach
...Show More Authors

Sedimentary structures of Gercus Formation in NE Iraq was little studied in the last decades. In this study the identified sedimentary structures display alternative graded and fining upward cycles, load and flute casts, submarine channels, sand and clay balls and pillow structures, convolute and slump beddings, of marine turbidity origin. The foreland part of Tethys basin characterized by deep marine Tanjero and Kolosh Formations followed by the Gercus formation with conformable relationships. The Eocene aged Flysch comprises predominantly litharenitic sandstones and interbedded mudstones, both of turbiditic affinities and most likely derived from a NE Arabian Plate source. The sediments provide excellent examples of distal fan sands as

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Phytocompound of pure thymol inhibit COVID-19 by binding to ACE2 receptor: In silico approach
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 06 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Acceleration of canine movement by laser assisted flapless corticotomy [An innovative approach in clinical orthodontics]
...Show More Authors

Background: Corticotomy-assisted orthodontic treatment is done to induce a state of increased tissue turnover and transient osteopenia, which is followed by a faster rate of orthodontic tooth movement. It considered as an adjunct treatment option for orthodontic treatment of adults. The aim of this Study was to elucidate the effectiveness of a new surgical approach for acceleration of maxillary canine retraction in human with laser assisted flapless corticotomy and evaluate its effect on vitality of pulp and gingival sulcus depth. Materials and methods: the sample comprised of 15 Iraqi patients (9 females and 6 males; mean age 21.7), who were required extraction for their maxillary first premolars followed by retraction of the canines as pa

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Band Gap Characterization of Thermally Treated Hybrid Blend ZnPc/CdS Thin Films
...Show More Authors

Spin coating technique used to prepare ZnPc, CdS and ZnPc/CdS blend thin films, these films annealed at 423K for 1h, 2h and 3h. Optical behavior of these films were examined using UV-Vis. and PL. The absorption spectrum of ZnPc shows a decreasing in absorption with the increase of annealing time while CdS spectrum give a clearly absorption peak at~510 nm. Energy gap of ZnPc increases from 1.41 to 1.52 eV by increasing the annealing time. Eg of CdS decrease by increasing annealing time, from 2.3 eV to 2.2 eV. The intensities of the peaks obtained from PL spectra were strongly dependent on annealing time and confirmed the results obtained from UV-Vis. D.C. conductivity measurement showed that all the thin films have two differen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Laser
PDF Tunable Optical filters Using Etched Polarization Maintaining Fiber Hybrid Sagnac Interferometer
...Show More Authors

: In modern optical communication system, noise rejection multiple access interference (MAI) must be rejected in dense access network (DAN). This paper will study the dual optical band pass and notch filters. They will be extracted with tunable FWHM using 10cm (PMF) with different cladding diameters formed with etching 125μm PMF after immersing it with 40% of hydrofluoric acid (HF). This fiber acts as assessing fiber to perform Sagnac interferometer with splicing regions that placed 12cm (SMF) for performing hybrid Sagnac interferometer that consists of Mach-Zehnder instead of Sagnac loop which is illuminated by using laser source with centroid wavelength of 1546.7nm and FWHM of 286 pm or 9 ns in the time domain. . Firs

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
A Review of Data Mining and Knowledge Discovery Approaches for Bioinformatics
...Show More Authors

     This review explores the Knowledge Discovery Database (KDD) approach, which supports the bioinformatics domain to progress efficiently, and illustrate their relationship with data mining. Thus, it is important to extract advantages of Data Mining (DM) strategy management such as effectively stressing its role in cost control, which is the principle of competitive intelligence, and the role of it in information management. As well as, its ability to discover hidden knowledge. However, there are many challenges such as inaccurate, hand-written data, and analyzing a large amount of variant information for extracting useful knowledge by using DM strategies. These strategies are successfully applied in several applications as data wa

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Hanbali's approach to building long and short travel provisions with issues attached to their provisions
...Show More Authors

 

The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).

The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.

The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref