Preferred Language
Articles
/
jih-1676
On Rational -Valued Characters of Certain Types of Permutation Group
...Show More Authors

Tow   results  are  proved.  The  first  gives necessary  and   ullicient

conditions for a permutation group to have the prope1ty that each of its rational - valued character can be written as (integral) linear combination of characters induced from the principal characters of certain subgroup. The mher presents that this property is extendable to direct product of groups.

Examples give.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
The Impact of Fear and Rational Appeal Scam Techniques on Individual Susceptibility
...Show More Authors

Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Systems Science And Mathematical Sciences
SCREENING TESTS FOR DISEASE RISK HAPLOTYPE SEGMENTS IN GENOME BY USE OF PERMUTATION
...Show More Authors

The haplotype association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease.Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls.It starts with inferring haplotypes from genotypes followed by a haplotype co-classification and marginal screening for disease-associated haplotypes.Unfortunately,phasing uncertainty may have a strong effects on the haplotype co-classification and therefore on the accuracy of predicting risk haplotypes.Here,to address the issue,we propose an alternative approach:In Stage 1,we select potential risk genotypes inste

... Show More
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of College Of Education
Recognition the Arabic Characters Based on the Characteristics of Arabic Language
...Show More Authors

Publication Date
Thu Mar 22 2012
Journal Name
مجلة كلية التربية الاساسية
The effect of NPK fertilize on some physiological characters of Apium graveolens
...Show More Authors

The experiment was carried out to study the effect oftwo concentration of NPK 0.25 and 0.50g/kg soil on some physiological characters of Apium graveolens. The results showed that the both concentration increased percentage of germination, plant height, Length of roots, roots diameter, absolute growth rate (AGR), relative growth rate (RGR) and percentage of N, P and K in plants

Publication Date
Sun Dec 30 2012
Journal Name
College Of Islamic Sciences
Interpretation of opinion At the rational school Descriptive study
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and his family and companions until the Day of Judgment.
      The words of God Almighty are for the sake of the greatest and greatest speech, and the scholars, may God have mercy on them, raced.
To dive into knowing the word of God and what he intended, so they wrote in it the literature and collected works in it, and explained it to those after them.
      And when the noble companions, were extremely eloquent and eloquent, because the Holy Qur’an was revealed in the language of the Quraysh, and all the Arabs knew their language, they understood the Holy Qur’an and applied it p

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Iraqi Journal Of Community Medicine
The Rational Use of Collagen in Osteoarthritis: Review article
...Show More Authors

Osteoarthritis is a degenerative disease affecting joints that is chronic and disables the movement of patients with increasing pain and decreasing their quality of life with age. Available treatments are only symptomatic with no cure. Recent methods for managing osteoarthritis involve using pharmacological, non-pharmacological treatments or both for improving physical function in patients and alleviating pain. Clinical trials were conducted to reveal the extent of benefits obtained from different nutraceuticals and food supplements, such as collagen with growing use and fairly good results in the treatment of osteoarthritis. The goal of this study is to review the current information about the rational use of collagen in osteoarthritisKeyw

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 06 2023
Journal Name
Baghdad Science Journal
Quotient on some Generalizations of topological group
...Show More Authors

In this paper, we define some generalizations of topological group namely -topological group, -topological group and -topological group with illustrative examples. Also, we define grill topological group with respect to a grill. Later, we deliberate the quotient on generalizations of topological group in particular -topological group. Moreover, we model a robotic system which relays on the quotient of -topological group.

View Publication Preview PDF
Scopus Crossref