Preferred Language
Articles
/
ixbtvYoBVTCNdQwCrKR6
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
A topology on a ring part of is-algebra
...Show More Authors

Scopus (1)
Scopus Clarivate
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling of a Sulfonation Reactor in a Detergent Factory
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jun 19 2017
Journal Name
Arabian Journal For Science And Engineering
A New Method to Tune a Fractional-Order PID Controller for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (31)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (47)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 10 2023
Journal Name
Linguistics And Translation Studies
Comparative analysis of zoomorphic metaphors of the Russian Arabic language as a method of studying cultural linguistics
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Acquisition provisions in Islamic jurisprudence: A model - a comparative study
...Show More Authors

Acquisition provisions in Islamic jurisprudence

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
A Study of a-Si:H Absorption Edge Using Dunstan’s Model
...Show More Authors

The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
2020 International Conference On Computer Science And Software Engineering (csase)
Implementing a Super Decisions Software (SDS) in a Transport Sector
...Show More Authors

View Publication
Scopus Crossref