Preferred Language
Articles
/
jmracpc-279
SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS: SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS
...Show More Authors

The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5 In addition to the control treatment T1, which was devoid of dried rumen powder, the fish were fed on experimental diets of 4% of their body weight and weighed every 15 d. The results showed that the T2 treatment was one of the best experimental treatments, as it gave the highest levels for most of the studied traits. The results indicated that there were significant differences (p>0.01) and (P < 0.05) between it and the control treatment T1 in growth parameters, which included the final weight average of 715 g and the rate of increase The total weight is 512.50 g, the daily weight gain rate is 12.32 g/d, the relative growth rate is 252.47%, and the specific growth rate is 1.75 g/d. The criteria for evaluating the diet, which included the amount of feed intake 1765.26 g and the amount of protein intake 577.41 g, and the best food conversion ratio of 3.44 and the efficiency of food conversion was 29.03 % and the value of the protein produced is 64.21% and the net exploited protein is 0.73%. We conclude from the current study that the dried rumen powder can be used by 25% in the diets of common carp (Cyprinus carpio L.) as a partial substitute for imported animal protein because it contributed to improving production performance. It can also be used Dried rumen powder at rates of 50 and 75%, but did not reach the levels achieved by 25%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique
...Show More Authors

    The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is  now  the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce  identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the  robust system.  In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Moderate discourse and civil peace
...Show More Authors

Abstract

  Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.

Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.

In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:

  • Features of moderate religious discourse
  • The role of moderate discourse in establishing communit

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Open Engineering
Producing low-cost self-consolidation concrete using sustainable material
...Show More Authors
Abstract<p>The disposal of the waste material is the main goal of this investigation by transformation to high-fineness powder and producing self-consolidation concrete (SCC) with less cost and more eco-friendly by reducing the cement weight, taking into consideration the fresh and strength properties. The reference mix design was prepared by adopting the European guide. Five waste materials (clay brick, ceramic, granite tiles, marble tiles, and thermostone blocks) were converted to high-fine particle size distribution and then used as 5, 10, and 15% weight replacements of cement. The improvement in strength properties is more significant when using clay bricks compared to other activated waste </p> ... Show More
View Publication
Crossref (7)
Crossref