Preferred Language
Articles
/
joe-1733
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses. The proposed method uses local feature of fingerprint represented by minutiae positions to overcome the problem of repeated key to perform encryption and decryption of a text message, where, the message will be ciphered by a modified Vigenère method. Unlike the old usual method, the key constructed from fingerprint minutiae depend on instantaneous date and time of ciphertext generation. The Vigenère table consist of 95 elements: case sensitive letters, numbers, symbols and punctuation.  The simulation results (with MATLAB 2021b) show that the original message cannot be reconstructed without the presence of the key which is a function of the date and time of generation. Where 720 different keys can be generated per day which mean 1440 distinct ciphertexts can be obtained for the same message daily.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Distortions and Time Management as Predictors of Academic Procrastination among Students from Al Aqsa Community College
...Show More Authors

The study aimed to reveal the possibility of predicting academic procrastination through both Cognitive distortions and time management among students of Al-Aqsa Community College, as well as to reveal the level of both cognitive distortions, time management, and academic procrastination. Additionally, it aimed to identify the size of the correlation between cognitive distortions, time management, and academic procrastination. The study sample consisted of (250) students from Al-Aqsa community college students. The results of the study concluded that the mean for each level of cognitive distortions and academic procrastination is average. The mean level of time management is high. There is a statistically significant positive relationshi

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Euphrates Journal Of Agricultural Science
MEASURES OF SPECIFIC PRODUCTIVITY, ACTUAL TIME, APPEARANCE AND TILLAGE DEVIATION FOR TWO PLOWS MOSTLY USED IN IRAQ
...Show More Authors

Experiment was conducted in Baghdad, three factor were used in this research included Two types of Plows included moldboard and disk plows which represented the main plot, Three forward speeds of the tillage was the second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and Three levels of Soil Moisture was third factor included 21, 18 and 14 % in all of Vertical and Lateral Plowing Deviation, Practical and specific productivity, actual time for plowing one donam and appearance (goodness) of Tillage represented by the number of clods > 10 cm in silt clay loam soil with depth 22 cm were studied. the experiment was used Split – split plot design under randomized complete block design with three replications and Le

... Show More
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
comparison between the methods estimate nonparametric and semiparametric transfer function model in time series the Using simulation
...Show More Authors

 The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method  local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Applied And Computational Mathematics
Memory Effects Due to Fractional Time Derivative and Integral Space in Diffusion Like Equation Via Haar Wavelets
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Publication Date
Sun Nov 19 2017
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
...Show More Authors

Image compression is a serious issue in computer storage and transmission,  that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the  mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Extractive Multi-Document Summarization Model Based On Different Integrations of Double Similarity Measures
...Show More Authors

Currently, the prominence of automatic multi document summarization task belongs to the information rapid increasing on the Internet. Automatic document summarization technology is progressing and may offer a solution to the problem of information overload. 

Automatic text summarization system has the challenge of producing a high quality summary. In this study, the design of generic text summarization model based on sentence extraction has been redirected into a more semantic measure reflecting individually the two significant objectives: content coverage and diversity when generating summaries from multiple documents as an explicit optimization model. The proposed two models have been then coupled and def

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref