Preferred Language
Articles
/
joe-1561
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Technological route and characteristics of home - built Ag, Ag/Cu, and Ag/Ni ohmic conductor pastes
...Show More Authors

The current research reports the preparation and fabrication of the silver paste conductor which is employed as a soldering material for electro – optical components ohmic interconnections. The prepared paste possesses electrical characteristics identical to the ohmic connectors as its observable from resistance – temperature variation. Moreover, the I – V characteristics obeys Ohm’s law and this dependency was further confirmed by the nearly constant capacitance measurements with voltage and frequency. A noticeable improvement in electrical conductivity, compared to the pure silver paste sample, was noted for samples prepared by mixing predetermined weight ratios of brass and copper. Furthermore, stability of electrical resistan

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Enhancement Solution to Improve Remediation of Soil Contaminated with Lead by Electrical Field
...Show More Authors

A laboratory investigation of six different tests were conducted on silty clay soil spiked with lead in concentrations of 1500 mg/kg. A constant DC voltage gradient of 1 V/cm was applied for all these tests with duration of 7 days remediation process for each test. Different purging solutions and addition configurations, i.e. injection wells, were investigated experimentally to enhance the removal of lead from Iraqi soil during electro-kinetic remediation process. The experimental results showed that the overall removal efficiency of lead for tests conducted with distilled water, 0.1 M acetic acid, 0.2 M EDTA and 1 M  ammonium citrate as the purging solutions were equal to 18 %, 37 %, 42 %, and 29 %, respectively. H

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
The Defensive Methods Against Deepfake: Review
...Show More Authors

     Due to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and Sustainable Development in Fragile Environments: A Field Social Study of Slums in the City of Baghdad/Al-Karkh: هبة صالح مهدي, عدنان ياسين مصطفى
...Show More Authors

Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Chitosan and Keratin Hydrolysate Treatment of Archived Newsprint
...Show More Authors

  The study is focused on the modification of the standardized newspaper with natural polymers chitosan and keratin hydrolysate applied on the paper surface from polymer solution. This modification is based particularly on the formation of the complexes between acidic surface groups on cellulose fibers and the natural polymers which improved the mechanical properties of the paper and the positive results which were observed particularly in folding endurance of the newspaper.
 
 

View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Preparation and Characterization of BeO-Supported Feldspar Porcelain
...Show More Authors

Due to the specific characteristic of porcelain, the insertion of Beryllium oxide has been studied. The basic materials and quantities were selected carefully. In this work, porcelain containing 32 wt% feldspar, 24 wt% quartz and 44 wt% clay was synthesized and  beryllium oxide (BeO) (1 wt.%, 3 wt.%, 5 wt% and 7wt%) were add. The basic and new composition porcelain powders were uniaxially compacted into standard samples dimensions and fired at various sintering temperatures, 1100°C, 1300°C, and 1450°C then  held for 2 hour in a furnace.

The effects of sintering temperatures and beryllium oxide content on mechanical, electrical and structural properties were studied. The increasing of sintering temperature on the basi

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Crossref