Preferred Language
Articles
/
ijs-9322
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with comparable encryption time with the canonical RC4 version.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 24 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Acta Facultatis Medicae Naissensis
Helicobacter pylori in obese females
...Show More Authors

Obesity is an increasing health problem in developing countries and has grown into a major global epidemic. Recent studies suggest that colonization of the stomach with Helicobacter pylori (H. pylori) may affect gastric expression of appetite and satiety-related hormones, finding that patients cured of H. pylori infection have gained weight. Further exploration of the relationship between obesity and H. pylori infection is therefore warranted. The objective of this study was to determine the prevalence of H. pylori infection in a sample of obese patients. A total of 69 obese females and 55 normal-weight females as a control group were included. Body mass indices (BMI) of all females were measured and tests for H. pylori performed. Subjects

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Political Sciences Journal
The effect of the media in forming knowledge and political awareness
...Show More Authors

Abstract The dissemination of knowledge is no longer confined to schools and universities, not even books. For nearly two centuries, the media have become prominent in disseminating knowledge and culture, in its public and particularly political aspects. After the development of the media from newspapers and magazines to the visual media, their role has increased from the dissemination of abstract information and abstract knowledge towards the process of forming new knowledge through what it publishes and broadcasts from different programs such as drama, news and talk shows. The impact of the media has changed the overall community awareness. Half a century ago the media was not so powerful and widespread. The evolution of the 1990s made

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Stability and Acceleration of Projection Algorithms
...Show More Authors

The focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Turbid of Water By Using Fuzzy C- Means and Hard K- Means
...Show More Authors

In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected  from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER: AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER
...Show More Authors

This paper is dealing with an experimental study to show the influence of the geometric characteristics of the vortex generators VG son the thickness of the boundary layer (∂) and drag coefficients (CD) of the flat plate. Vortex generators work effectively on medium and high angles of attack, since they are "hidden" under the boundary layer and practically ineffective at low angles.

            The height of VGs relative to the thickness of the boundary layer enables us to study the efficacy of VGs in delaying boundary layer separation. The distance between two VGs also has an effect on the boundary layer if we take into

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Distress disorder and the tendency to pray among martyrs' wives
...Show More Authors

The research aimed at identifying  the level of Acute stress disorder  and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical dif

... Show More
View Publication Preview PDF