Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Solution for Multi-Objective Optimisation Master Production Scheduling Problems Based on Swarm Intelligence Algorithms
...Show More Authors

The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
organizational integrity and its impact in avoiding strategic deviations: Applied research in the Iraqi insurance company
...Show More Authors

Abstract:

                The aim of the current study lies in showing and demonstrating the effect of the independent variable of organizational integrity with its dimensions represented by (organizational optimism, organizational trust, organizational integrity, organizational sympathy) on the dependent variable of strategic drifts through its dimensions represented by (organizational culture, leadership, innovation, strategic planning) .The analytical descriptive approach has been adopted and the questionnaire has been used as a tool to obtain data and information from the sample of (57) people who are at the administrative levels (seni

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Implement an EC-Application Based on Multi Database Environment
...Show More Authors

 The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
 

View Publication Preview PDF
Publication Date
Sat Jan 23 2021
Journal Name
Neural Computing And Applications
Multi-objectives TLBO hybrid method to select the related risk features with rheumatism disease
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Multichannel Optimization With Hybrid Spectral- Entropy Markers for Gender Identification Enhancement of Emotional-Based EEGs
...Show More Authors

View Publication
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref