Preferred Language
Articles
/
jih-1833
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Arabic Handwriting Word Recognition Based on Scale Invariant Feature Transform and Support Vector Machine
...Show More Authors

Offline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters.  In this paper a proposed method for Offline Arabic handwritten recognition. The   proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and   support vector machines (SVMs) to enhance the recognition accuracy. The proposed method  experimented using (AHDB) database. The experiment result  show  (99.08) recognition  rate.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 08 2023
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Role of Banking Compliance to Reduce Risks to Run
...Show More Authors

The importance of operational risks increases with the increase in technological development, the development of banking operations, the extent of banking compliance, and the attempt of many banks to achieve quality in banking services. And the extent of the position occupied by Iraqi banks for banking compliance and reducing operational risks. The Basel Committee (2) paid its attention to operational risks and the interest of international banks to follow policies that work to ensure banking compliance and cover operational risks, because of its role in reducing losses due to increased costs and achieving an increase in profits. Realizing and working to confront the best possible and traditional methods, that some risks Operational problem

... Show More
View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Properties of Superpave Asphalt Concrete Subjected to Impact of Moisture Damage
...Show More Authors

Moisture damage is a primary mode of distress occurring in hot mix asphalt (HMA) pavements in Iraq. Because of the loss of bond, or stripping, caused by the presence of moisture between the asphalt and aggregate, which is a problem in some areas and can be severe in some cases, it is requires to evaluate the design asphalt mixture to moisture susceptibility. Many factors such as aggregate characteristics, asphalt characteristics, environment, traffic, construction practices and drainage can contribute to stripping. Asphalt concrete mixes were prepared at their optimum asphalt content by superpave system and then tested to evaluate their engineering properties, which include tensile strength, resilient modulus, and perman

... Show More
View Publication
Publication Date
Mon Aug 28 2023
Journal Name
Journal Of Planner And Development
Emergency of Edge city between Regeneration and Acclimatization Urban
...Show More Authors

           In the nineteenth century, a new type of cities appeared, known as new cities located on the edges of major cities, and these cities began to  decentralization, urban studies turned to this type of cities to find out the most important reasons for the emergence of new cities and find out what those cities will become . Therefore, we will discuss in this research how the urban emergence of these cities (edge cities) occurs, so the research formulates its problem : The need to know the stages that edge cities go through, ending with their emergence, and the mechanisms that cities take within their context  ( regeneration or adaptation ), Assuming that edge cities are a

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 25 2021
Journal Name
Iraqi Journal Of Science
Evaluation of the Performance of Silicon Solar Cell with Fresnel Lens as Photovoltaic Solar Concentrator
...Show More Authors

     In this paper, the performance of a silicon cell with a Fresnel lens (FL) for building a solar photovoltaic concentrator system was evaluated; the solar concentrator is a Fresnel lens, which is a point concentrator made of  polymethyl-methacrylate (PMMA) as a thin lens for the optics system.

As the radiation from the sun on the solar cell is concentrated to the levels of solar radiation  of 750, 1300, 1930, 2600, 4250, 7250, and 10500) W/m2, the work was conducted at the midday in summer weather conditions, with ambient temperatures ranging 40-45 °C. The evaluation was performed in three cases; each case was conducted in succession. The performance of the cell was evaluated first wit

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A comparative reading of the social and political satire in the works of Abu al-Fadl Zrui Nasrabad and Ahmad Rajab (The tadhk: خوانش تطبیقی طنز اجتماعی – سیاسی در آثار ابوالفضل زرویی نصرآباد و احمد رجب(مورد مطالعه: تذکرة المقامات زرویی و نصف كلمة احمد رجب)
...Show More Authors

           Satire is genre of the literary arts that has always been the source of human interest. Because  it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 11 2023
Journal Name
College Of Islamic Sciences
Collision in the dispute between the two imams Shafi’i and Abu Hanifa by Sheikh Mansour bin Muhammad bin Abd al-Jabbar al-Marwazi al-Samani Abi al-Muzaffar (d. 498 AH) from the issue (If one of the Muslim spouses apostatized and one of the infidel spouses
...Show More Authors

The science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Some Results on mX-N-connected Space
...Show More Authors

In this essay, we utilize m - space to specify mX-N-connected, mX-N-hyper connected and mX-N-locally connected spaces and some functions by exploiting the intelligible mX-N-open set. Some instances and outcomes have been granted to boost our tasks.

View Publication Preview PDF
Scopus (1)
Scopus Crossref