Preferred Language
Articles
/
jih-2655
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However, the key generation process in our scheme has been done without any intervention from the certificate issuer and avoiding the risk of compromised CA. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been used with the ECDH to handle the authentication of the key exchange. The proposed scheme is demonstrated on a big dataset of social networks. The scheme is analyzed based on security criteria that have been compared with the previous schemes to evaluate its performance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
The Utilization of Remote Sensing Imagery and Inverse Distance Weighted Scheme to Simulate the White Oil Effects on Soil Geotechnical Properties
...Show More Authors

     This research aims to utilize a complementarity of field excavations and laboratory works with spatial analyses techniques for a highly accurate modeling of soil geotechniques properties (i.e. having lower root mean square error value for the spatial interpolation). This was conducted, for a specified area of interest, firstly by adopting spatially sufficient and  well distributed samples (cores). Then, in the second step, a simulation is performed for the variations in properties when soil is contaminated with commonly used industrial material, which is white oil in our case. Cohesive (disturbed and undisturbed) soil samples were obtained from three various locations inside Baghdad University campus in AL-J

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Waterpipe Smoking Effect on Clinical Periodontal Parameters, Salivary Flow Rate and Salivary pH in Chronic ‎Periodontitis Patient
...Show More Authors

Background: Waterpipe tobacco smoking has become common especially among young people, Waterpipe smoking misconcepted as a safer mean of smoking, so in this study we will highlight the effect of Waterpipe smoking ‎on periodontal and oral health.‎ Materials and method. The selected ‎‎‎100 male subjects of 30-40 years, ‎categorized into 4 groups (each group ‎‎25 subject): Waterpipe smoker ‎with ‎healthy periodontium, ‎Waterpipe smoker ‎‎with chronic periodontitis, Non-‎‎smoker ‎with healthy periodontium and Non-smoker ‎with chronic periodontitis. Whole ‎unstimulated ‎saliva was collected. Clinical measurements: plaque ‎index

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Conjugation of Steroidal and Non – Steroidal Anti- Inflammatory Drugs as Possible Mutual Prodrug
...Show More Authors

Prednisolone (SAID) was conjugated with ibuprofen (NSAID) through an amino acid (glycine) as a spacer arm to synthesize the following compound:

Prednisolone – glycine – ibuprofen.

    The method employed consists of converting the carboxylic acid function of (R,S) – ibuprofen – glycine to the highly reactive acid chloride and subsequent reaction with the C21 hydroxyl group of prednisolone. This reactive intermediate was found to react as well with the C17 tertiary hydroxyl group of the steroid to form three compounds and eight diastereomers. These results were confirmed by T.L.C, and the desired compound was separated by column chromatograph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigating Particular Representations for Matrix Lie Groups SO(3) and SL(2,₵)
...Show More Authors

A complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵)  have been obtained. A new representation of their tensor product is naturally arisen and computed in details.

View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref