Preferred Language
Articles
/
jih-1833
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 31 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A comparative study to evaluate the effect of ultrasonic agitation on push-out bond strength of three root-end filling materials: An in vitro study
...Show More Authors

Aim: To evaluate the effect of ultrasonic agitation for retrograde biodceramic root repair, MTA and biodentine filling materials on push-out bond strength to dentine walls. Materials and Methods: Ninety extracted human teeth with single straight roots were selected randomly. After disinfection and cleaning, the coronal portions were sectioned to standardize the root canal length at 15mm. following root canal shaping, obturation and apical roots resection, retrograde cavities were prepared. Teeth were categorized depending on the filling material used into three groups, 30 teeth each. Group A filled with bioceramic root repair material, B with MTA and C with Biodentine material. These groups were divided in to three subgroup (n= 10). Subgrou

... Show More
Scopus (1)
Scopus
Publication Date
Wed Jun 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Effect of adding the Flavonoids from Zizypus spina-christi leaves in redox indicators of the fat extracted from Cows, Sheeps bones and storage on defferent temperature and periods.: Effect of adding the Flavonoids from Zizypus spina-christi leaves in redox indicators of the fat extracted from Cows, Sheeps bones and storage on defferent temperature and periods.
...Show More Authors


Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Role Of Historical Memory In Promoting The Concept Of Belonging To The Homeland In A Novel "Mazurka For Two Dead Men" Of The Spanish Novelist Camilo Jose Cela: El Papel De La Memoria Histórica En El Apoyo Del Concepto De Pertenencia A La Patria , En La Novela “Mazurca Para Dos Muertos”, De Camilo José Cela
...Show More Authors

       The present study discusses the significant role of the historical memory in all the Spanish society aspects of life. When a novelist takes the role and puts on the mask of one of the novel’s protagonists or hidden characters, his memory of the events becomes the keywords of accessing the close-knit fabric of society and sheds lights on deteriorating social conceptions in  a backwards social reality that rejects all new progressive ideas and  modernity. Through concentrating on the society flawing aspects and employing everything of his stored memory, the author uses sarcasm to criticize and change such old deteriorating reality conceptions.   

   &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The Correlation between the Dimensions of Organizational Silence and the F Function Life an Exploratory Study of the Views of a Sample of Workers in the Health Center / Sulaykh: The Correlation between the Dimensions of Organizational Silence and the F Function Life an Exploratory Study of the Views of a Sample of Workers in the Health Center / Sulaykh
...Show More Authors

The research aims to test the effect of the behavioral factors (intangible) represented by an explanatory variable represented by organizational silence and a responsive variable of quality of Function life. The problem was the negative effects of the organizational silence on the morale of the employees and consequently their performance and the quality of function life. To collect the data and information needed to measure the two variables of research conducted in the health center / Sulaikh by taking a sample of (40) employees to test the hypotheses of research through the survey of their views, using statistical tools non parametric using the program. The most important recommendations were the establishment of training workshops fo

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Military Thinking and His Islamic balance in The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar (God be pleased on him ): The Military Thinking and His Islamic balance in The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar (God be pleased on him )
...Show More Authors

Abstract
This study turns about The Military Thinking and His Islamic balance in
The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar
(God be pleased on him )The military field is very wide in all intellectual and
practically effects at The Caliph Ali Bin Abi Taleb(peace is on him ). Its
considered the first seed for islam ,therefore,there are a lot from military
situtions which proved his practical experience in these affairs , and away
from the details of war and practical battles lets search the sample and the
academic study for fair military thinking (justice) in The Compact of Caliph Ali
to Malek Al Ashtar when he became the ruler of egypt.
The military fair thinking determines fr

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Structure for Modeling and Controlling Nonlinear Systems
...Show More Authors

This paper proposes a new structure of the hybrid neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Weight parameters of the hybrid neural structure with its serial-parallel configuration are adapted by using the Back propagation learning algorithm. The ability of the proposed hybrid neural structure for nonlinear system has achieved a fast learning with minimum number

... Show More
View Publication Preview PDF
Crossref