Preferred Language
Articles
/
jih-710
Enhancement of Stream Cipher by Using Variant Register in Length

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that has the longest time is the best in encryption. Then it was found that proposed method is stronger in encryption than RSA.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Construction of (k,3)-Arcs in PG(2,9) by Using Geometrical Method

  In this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic.         We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness

View Publication Preview PDF
Publication Date
Sat Dec 15 2018
Journal Name
Revista De Chimie
Determination of Ethanol in Fermented Broth by Headspace Gas Chromatography using Capillary Column

The gas chromatography (GC) method in analytical chemistry is a quick and accurate method to detect volatile components like ethanol. A method for determining volatile components known as Headspace chromatography (HS-GC) was developed along with an internal standard method (ISM) to identify ethanol in fermented broth in the laboratory. The aim of this research is determining the concentration of ethanol in fermented broth using capillary column (ZB-1). This method can analyze ethanol concentrations in the fermented medium broth ranging from 10 to 200 g/L. The validation of this method was done in order to obtain the results to be of high precision and the significant, precision was represented as the relative standard deviation (RSD) which

... Show More
Crossref (3)
Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
International Journal Of Heat And Technology
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation of the Radionuclide Concentrations in Samples of Condiments by Using Gamma Spectroscopy System

 The aim of this work  is to evaluate concentrations of  natural and artificial radionuclide  in nine different samples of condiments from local markets.     The concentrations of 238 U , 232 Th ,40k  and 137Cs  were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k  and 137Cs   were found to be in a range of  (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1  respectively. These concentrations are not hazardous to public health and the activities are within the allowed  levels

View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Studying the ability of transformation of lymphocytes by using PHA in patient with Cytomegalovirus

Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Study affects Pulse Parameters versus cavity length for both Dispersion Regimes in FM mode locked.: Bushra.R.Mhdi|Gaillan H.Abdullah|Mohand M.Azzawi|Nahla.A.Hessin|Basher.R.Mhdi

To demonstrate the effect of changing cavity length for FM mode locked on pulse parameters and make comparison for both dispersion regime , a plot for each pulse parameter as Lr function are presented for normal and anomalous dispersion regimes . The analysis is based on the theoretical study and the results of numerical simulation using MATLAB. The effect of both normal and anomalous dispersion regimes on output pulses is investigate Fiber length effects on pulse parameters are investigated by driving the modulator into different values. A numerical solution for model equations using fourth-fifth order, Runge-Kutta method is performed through MATLAB 7.0 program. Fiber length effect on pulse parameters is investigated by driving th

... Show More
Crossref
View Publication
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
Estimation the best areas of Sun duration hours in Iraq by applying IDW type of interpolation techniques by using GIS program

In this paper solar radiation was studied over the Iraqi countary land. The best sun duration hours regions (maximum hours) in Iraq were estimated detected by using Geographic information system (GIS Ver. 9.2) program to apply the (Inverse distance weighting) IDW exact interpolation technique depending on the measured data of metrological stations were distributed on the land areas of Iraq. The total area of the best regions was calculated .Excel 2007 program is used in calculation, graphics and comparison the results.

View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Functional enhancement and its reflection on industrial product systems

The research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ

... Show More
Crossref
View Publication Preview PDF