Preferred Language
Articles
/
joe-1561
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 21 2024
Journal Name
International Development Planning Review
THE EFFECT OF USING A DISABLING FORCE TRAINING TOOL ON WALKING PERFORMANCE: AN ANALYTICAL STUDY OF TIME AND STEP LENGTH IN THE 20 KM WALKING RACE EVENT FOR APPLICANTS
...Show More Authors

Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Detecting DNA of multispecies dinoflagellate cysts in the sediment from three estuaries of Makassar strait and fishing port using CO1 primer: Is it CO1 primer suitable for detecting DNA dinoflagellate?
...Show More Authors

Most dinoflagellate had a resting cyst in their life cycle.  This cyst was developed in unfavorable environmental condition. The conventional method for identifying dinoflagellate cyst in natural sediment requires morphological observation, isolating, germinating and cultivating the cysts.  PCR is a highly sensitive method for detecting dinoflagellate cyst in the sediment.  The aim of this study is to examine whether CO1 primer could detect DNA of multispecies dinoflagellate cysts in the sediment from our sampling sites. Dinoflagellate cyst DNA was extracted from 16 sediment samples. PCR method using COI primer was running. The sequencing of dinoflagellate cyst DNA was using BLAST. Results showed that there were two clades of dinoflag

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 03 2022
Journal Name
International Journal Of Health Sciences
Using Elisa and nested PCR for detection of the toxoplasmosis in milk and the influence of infection and some factors on milk composition in the Iraqi local and Shami goats
...Show More Authors

This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2001
Journal Name
Scientific Nursing Journal
Labelling of circulating phagocyting cells using methylene blue
...Show More Authors

To asses methylene blue as a cell marker, the cells of the buffy coat were labelled by incubating them in a medium containing a lable [Methylene blue] which is prepared in a concentration of 1%[1, 2, 3, 4, 5, 6] drops were tried at different periods of incubation [+/-,+/-, 1+/-, 1+/-] at 37 C degree. The results showed that monocytes and polymorphs are the main cells involved in the phagocytosis of this dye