Preferred Language
Articles
/
jih-1393
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors

Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Using Polyurethane Coating of Concrete Pipes with Acid Attack Resistance in Sewer Lines
...Show More Authors

One of the most important challenges facing the designers of the sewerage system is the corrosion of sewers due to the influence of sewerage contaminates which lead to failure of the main lines of sewers. In this study, a reference mix of 1: 1.5: 3 was used and the 4% Flocrete PC200 by weight of cement was added to the same mixing ratio in the second mixture. Twenty-four samples were tested for each mixture, 12 of which were used to compression strength test in ages (7, 14 and 28) day and six samples were submerged after 28 days of wet treatment at (5 and 10) % concentrations of sulfuric acid. The other six samples were painted after 28 days of wet treatment with coating Polyurethane and after 24 hours were flooded with a concentrat

... Show More
View Publication
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Pollution Research Journal
ANALYSIS OF THE HYDRAULIC CHARACTERISTICS OF AL MAHAWIL STREAM USING HECRAS: A FIELD STUDY
...Show More Authors

A water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Performance Analysis Of Vertical Axis Wind Turbine Blades Using Double Multiple Stream Tube Process
...Show More Authors

       The interest in green energy in recent years is very noticeable, as this energy is a very important alternative that can replace fuel in many applications, most notably electric power generation, so work must be done to develop a form of this energy such as wind energy by working on the development of turbines. The DMST method provided by Qblade software is an integrated tool for making a simulation of a vertical axis wind turbine (VAWT). The simulation was carried out on vertical axis wind turbines, designing turbine blades according to symmetrical NACA0018, and calculating some parameters such as power, torque and power coefficient. It is found that this type of turbine can be improved by treating the blade edges that cont

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Design of Light Trapping Solar Cell System by Using Zemax Program
...Show More Authors

View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Suspended Sediment Concentration and Stream Discharge Relationship During Storm Events in Tributaries of Smaquli Stream, Erbil, Iraq
...Show More Authors

The primary objective of this study is to monitor and collect data from the main
tributaries of Smaquli stream during rainfall storm events, which can be used to
establish relationship between suspended sediment concentration and discharge. The
Smaquli catchment is divided into two sub-catchments namely Sarwchawa and
Krosh with areas of 80.64 and 34.82 km2 respectively. Jali dam is built at watershed
outlet. Rainfall, stream discharge, and suspended sediment concentration are
monitored during ten rainfall storms in the water years (2012-2013) and (2013-
2014). Analysis of the data from the two sampling sites, shows two different
responses of suspended sediment concentrations. The Krosh sub-catchment reacts
rapi

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Astrophysics And Space Science
The compound stream event of March 20-25, 2011 as measured by the STEREO B spacecraft
...Show More Authors
Abstract<p>The interaction of interplanetary coronal mass ejections (ICME) with each other and with co-rotating interaction regions (CIR) changes their configuration, dynamics, magnetic field and plasma characteristics and can make space weather forecasting difficult. During the period of March 20–25, 2011, the Solar Terrestrial Relation Observatory (<italic>STEREO</italic> B) encountered a compound stream containing several interacting structures. Our analysis suggests that the stream consists of two ICMEs followed by an embedded ICME/CIR. The sudden appearance of the third ICME within the fast wind side of the CIR causes the proton temperature(<inline-formula><alternatives><tex-math></tex-math></alternatives></inline-formula></p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Aug 02 2019
Journal Name
The Fifth Conference On Smart Monitoring, Assessment And Rehabilitation Of Civil Structures Smar 2019
Rehabilitation of Mohammed Al-Qassim Bridge after Fire Attack Using CFRP Sheets: A Case Study
...Show More Authors

View Publication