Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Thu Sep 06 2018
Journal Name
Al-khwarizmi Engineering Journal
Bone Defect Animal Model for Hybrid Polymer Matrix Nano Composite as Bone Substitute Biomaterials
...Show More Authors

Addition of bioactive materials such as Titanium oxide (TiO2), and incorporation of bio inert ceramic such as alumina (Al2O3), into polyetheretherketone (PEEK) has been adopted as an effective approach to improve bone-implant interfaces. In this paper, hot pressing technique has been adopted as a production method. This technique gave a homogenous distribution of the additive materials in the proposed composite biomaterial. Different compositions and compounding temperatures have been applied to all samples. Mechanical properties and animal model have been studied in all different production conditions. The results of these new TiO2/Al2O3/PEEK biocomposites with different

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Hybrid CNN-SMOTE-BGMM Deep Learning Framework for Network Intrusion Detection using Unbalanced Dataset
...Show More Authors

This paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Synthesis of ZnS Quantum Dots for QDs-LED hybrid device with different cathode materials
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Physics
Enhanced Mechanical Property of Acrylic Polymer/Graphene/Carbon Fibers Hybrid for Water Proof Coating
...Show More Authors

In this work, some mechanical properties of the polymer coating were improved by preparing a hybrid system containing Graphene (GR) of different weight percentages (0.25, 0.5, 1, and 2wt%) with 5wt% carbon fibres (CF) and added to a polymer coating by using casting method. The properties were improved as GR was added with further improvement on adding 5wt% of CF. The impact strength of acrylic polymer with GR increases with increasing weight ratio‏‏ of GR; maximum value was obtained when the polymer coating was incorporated with 1wt% GR and 5wt% CF. The impact strength of acrylic polymer with GR and GR/CF composites incorporated with GR at 1wt% and CF at 5wt%. Hardness increase with increasing weight ratio of Gr and a significant imp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Rheological Investigation of Lipid Polymer Hybrid Nanocarriers for Oral Delivery of Felodipine (Conference Paper )#
...Show More Authors

The rheological behavior among factors that are present in Stokes law can be used to control the stability of the colloidal dispersion system. The felodipine lipid polymer hybrid nanocarriers  (LPHNs) is an interesting colloidal dispersion system that is used for rheological characteristic analysis. The LPHNs compose of polymeric components and lipids. This research aims to prepare oral felodipine LPHNs to investigate the effect of independent variables on the rheological behavior of the nanosystem. The microwave-based technique was used to prepare felodipine LPHNs (H1-H9) successfully. All the formulations enter the characterization process for particle size and PDI to ascertain the colloidal properties of the prepared nanosystem t

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
M A Modified Similarity Measure for Improving Accuracy of User-Based Collaborative Filtering: Nadia Fadhil
...Show More Authors

Production sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Runge-Kutta Method for Oscillatory Problem Solution Using Trigonometric Fitting Approach
...Show More Authors

This paper provides a four-stage Trigonometrically Fitted Improved Runge-Kutta (TFIRK4) method of four orders to solve oscillatory problems, which contains an oscillatory character in the solutions. Compared to the traditional Runge-Kutta method, the Improved Runge-Kutta (IRK) method is a natural two-step method requiring fewer steps. The suggested method extends the fourth-order Improved Runge-Kutta (IRK4) method with trigonometric calculations. This approach is intended to integrate problems with particular initial value problems (IVPs) using the set functions  and   for trigonometrically fitted. To improve the method's accuracy, the problem primary frequency  is used. The novel method is more accurate than the conventional Runge-Ku

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparative for the EWMA charts by using non - homogeneous markov chain approach
...Show More Authors

In this study, we investigate the run length properties for the EWMA charts with time - varying control limits, and fast initial Response (FIR), for monitoring the mean of a normal process with a known standard deviation , by using non - homogeneous markov chain approach.

View Publication Preview PDF