Preferred Language
Articles
/
nBcuFY4BVTCNdQwCKTED
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.

Scopus Crossref
View Publication
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
Potentiometric Determination of Mebeverine Hydrochloride Using Imprinted Molecular Polymer in PVC Matrix Membrane‏
...Show More Authors

Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Post-interactive communication A study to build a model for the flow of communication in social networking sites
...Show More Authors

The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.

The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Design and FPGA Implementation of Matrix Multiplier Using DEMUX-RCA-Based Vedic Multiplier
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Randomand and social security
...Show More Authors

The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Democracy and human security
...Show More Authors

Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparative for the EWMA charts by using non - homogeneous markov chain approach
...Show More Authors

In this study, we investigate the run length properties for the EWMA charts with time - varying control limits, and fast initial Response (FIR), for monitoring the mean of a normal process with a known standard deviation , by using non - homogeneous markov chain approach.

View Publication Preview PDF
Publication Date
Mon Mar 23 2020
Journal Name
International Journal Of Nanoscience
Gold Nanoparticles Synthesis Using Environmentally Friendly Approach for Inhibition Human Breast Cancer
...Show More Authors

In this study, gold nanoparticles were synthesized in a single step biosynthetic method using aqueous leaves extract of thymus vulgaris L. It acts as a reducing and capping agent. The characterizations of nanoparticles were carried out using UV-Visible spectra, X-ray diffraction (XRD) and FTIR. The surface plasmon resonance of the as-prepared gold nanoparticles (GNPs) showed the surface plasmon resonance centered at 550[Formula: see text]nm. The XRD pattern showed that the strong four intense peaks indicated the crystalline nature and the face centered cubic structure of the gold nanoparticles. The average crystallite size of the AuNPs was 14.93[Formula: see text]nm. Field emission scanning electron microscope (FESEM) was used to s

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref