Preferred Language
Articles
/
jcoeduw-966
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
Building A 3D Geological model Using Petrel Software for Asmari Reservoir, South Eastern Iraq
...Show More Authors

Building a 3D geological model from field and subsurface data is a typical task in
geological studies involving natural resource evaluation and hazard assessment. In
this paper a 3D geological model for Asmari Reservoir in Fauqi oil field has been
built using petrel software. Asmari Reservoir belongs to (Oligocene- Lower
Miocene), it represents the second reservoir products after Mishrif Reservoir in Fauqi
field. Five wells namely FQ6, FQ7, FQ15, FQ20, FQ21 have been selected lying in
Missan governorate in order to build Structural and petrophysical (porosity and water
saturation) models represented by a 3D static geological model in three directions
.Structural model shows that Fauqi oil field represents un cylin

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 04 2018
Journal Name
Iraqi Journal Of Science
Geological modeling using Petrel Software for Mishrif Formation in Noor Oil Field, Southeastern Iraq
...Show More Authors

Petrel is regards one of the most important software to delineate subsurface Petrophysical properties to the reservoir. In this study, 3D Integrated geological models has been built by using Petrel software. The process includes integrated Petrophysical properties and environmental approaches.
Noor oil field within Mishrif Formation in terms of structural geology represents asymmetrical anticlinal fold with direction NW-SE. Porosity and water saturation model have been built. The reservoir was divided into several reservoirs and Nonreservoir units depends on the Petrophysical properties for each zone. In addition,
intact model for the reservoir in terms of porosity and water saturation have been b

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Design of New Dynamic Cryptosystem with High Software Protection
...Show More Authors

     In this paper a design of new robust and dynamic cryptosystem using stream key generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexibl

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
2015 9th Malaysian Software Engineering Conference (mysec)
Factors for communication technologies selection within virtual software teams
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Theoretical And Applied Information Technology
Factors affecting global virtual teams’ performance in software projects
...Show More Authors

Scopus (22)
Scopus
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
Recent Development-1 of CADTEL Software: The Resolution and Focusing Parameters Affecting at the Properties of Electron Magnetic Lenses
...Show More Authors

     Computer Aided Designing Tools of Electron Lenses (CADTEL) is a software packages cares about design, compute and plot simultaneously of the objective and projector properties of electron magnetic lenses. The developments in CADTEL software leads to contain a large fields and methods, adding to previous publish in 2013. The current improvement  is inserting of some  important parameters which are the resolution and focusing parameters. These parameters are angular semi-angle (α), focusing power (β), resolution limit (δ), image rotation (θ), spherical aberration (Cs), defocus (ΔZ), wave aberration (Χwab), depth of field (Dfld), and depth of focus (Dfoc) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 27 2020
Journal Name
Solid State Technology
Seepage and Slope Stability Analysis for Hemrin Earth Dam in Iraq Using Geo-Studio Software
...Show More Authors

View Publication
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
2020 International Conference On Computer Science And Software Engineering (csase)
Implementing a Super Decisions Software (SDS) in a Transport Sector
...Show More Authors

View Publication
Scopus Crossref