Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
The 2nd Universitas Lampung International Conference On Science, Technology, And Environment (ulicoste) 2021
A comparison between IRI-2016 and ASAPS models for predicting foF2 ionospheric parameter over Baghdad city
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Classic Local Least Estimatop And Bayesian Methoid For Estimating Semiparametric Logistic Regression Model
...Show More Authors

Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.

We compare two methods Bayesian and . Then the results were compared using MSe criteria.

A simulation had been used to study the empirical behavior for the Logistic model , with  different sample sizes and variances. The results using represent that the Bayesian method is better than the   at small samples sizes.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 04 2022
Journal Name
Contemporary Nurse
ICU nurses’ safety performance related to respect for safety and management commitment: A cross-sectional study
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Nuclear Physics A
Alpha-cluster preformation factor within cluster-formation model for odd-A and odd–odd heavy nuclei
...Show More Authors

View Publication
Scopus (46)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
COMPARATIVE STUDY BETWEEN A NOVEL DETERMINISTIC TEST FOR MERSENNE PRIMES AND THE WELL-KNOWN PRIMALITY TESTS
...Show More Authors

In this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (20)
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes
...Show More Authors

The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Methods for Removing Dyes from Polluted Water; A Review
...Show More Authors

Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Guggulusome - A Novel Vesicular Carriers for Enhanced Transdermal Delivery
...Show More Authors

The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare

... Show More
View Publication Preview PDF
Crossref