Preferred Language
Articles
/
jcofarts-1149
Visual analysis of the Kurdish women's dress and its impact on modernity
...Show More Authors

A collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary fashion young women and ensure that they do not abandon their traditional dress.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Moving Objects Detection Based on Frequency Domain: image processing
...Show More Authors

In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 21 2023
Journal Name
Mikrobiolohichnyi Zhurnal
Focus on Synergistic Bacteriocin-Nanoparticles Enhancing Antimicrobial Activity Assay
...Show More Authors

Antimicrobial resistance is one of the most significant threats to public health worldwide. As opposed to using traditional antibiotics, which are effective against diseases that are multidrug-resistant, it is vital to concentrate on the most innovative antibacterial compounds. These innate bacterial arsenals under the term «bacteriocins» refer to low-molecularweight, heat-stable, membrane-active, proteolytically degradable, and pore-forming cationic peptides. Due to their ability to attack bacteria, viruses, fungi, and biofilm, bacteriocins appear to be the most promising, currently accessible alternative for addressing the antimicrobial resistance (AMR) problem and minimizing the negative effects of antibiotics on the host’s m

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Diyala Journal Of Medicine
Histological Evaluation of Local Application of Flavonoid Extract of Capparis Spinosa on Wound Healing in Alloxan-Induced Diabetic Rats
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synergistic Effect of Potassium Iodide on Inhibitive Performance of Propyl Alcohol during Corrosion of Mild Steel in 1.0M HCl
...Show More Authors

   The inhibition of mild steel corrosion in 1.0M HCl by 1-propanol and the synergistic effect of potassium iodide (KI) was investigated using weight loss and polarization techniques in the temperature range (30 ‒ 50) ̊ C. A matrix of Doelhert to three factors was used as the experimental design, adopting weight loss results as it permits the use of the response surface methodology which exploited in determination of the synergistic effect as inhibition on the mild steel. The results were confirmed using electrochemical polarization measurements. Experimental results showed that the inhibition efficiency (IE%) increases with increase in concentration of inhibitor and with increasing of temperature. The addition iodide ions t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Effect of Chromium on Growth of green ALGA SCENEDESMUS QUADR ICAUDA (TURP.) DE BERB. With increase of nitrogen concentration
...Show More Authors

The study was conducted to identify the toxicity of chromium on scenedesmus quadricauda algae alone and in the presence of nutrient metal (Nitrogen). Different concentrations of chromium (0.5, 1.5 , 2.5, 3.5 , 4.5mg/L) were used and the presence nitrogen is (5 ,10 ,50 ,100mg/L) on cultur media(chu-10) with used for cultivation of the algae in controlled conditions(25oC , light intensity 380 –?E/m2 /s. The results showed increasing in the toxicity of the metal when is alone , excess of concentrations an time of exposure. The growth rate decreased from 0.44 to 0.06 cell/ hour after 12 day of the biging of the experiment and of concentrate 4.5 mg/L of chromium. The intermediate active concentrations of the chromium(EC50) was increase

... Show More
View Publication Preview PDF
Crossref