Preferred Language
Articles
/
nBcuFY4BVTCNdQwCKTED
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.

Scopus Crossref
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Formal Data of Bauhaus School and their Implications for Fabrics and Costumes Design: نور منصور خميس-وسن خليل ابراهيم
...Show More Authors

The current research discusses the topic of the formal data within the methodological framework through defining the research problem, limits and objectives and defining the most important terms mentioned in this research. The theoretical framework in the first section addressed (the concept of the Bauhaus school, the philosophy of the Bauhaus school and the logical bases of this school). The second section dealt with (the most important elements and structural bases of the Bauhaus school) which are considered the most important formal data of this school and their implications on the fabrics and costumes design. The research came up with the most important indicators resulting from the theoretical framework.
Chapter three defined the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
International Journal Of Interactive Mobile Technologies
The Impact of Teaching by Using STEM Approach in The Development of Creative Thinking and Mathematical Achievement Among the Students of The Fourth Scientific Class.
...Show More Authors

The research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking and mathematical achievement. To achieve it, the two researchers followed the quasi-experimental approach with an experimental design for two groups, one experimental and the other a control. The research sample consisted of (32) female students from the fourth scientific grade in Al-Intisar Preparatory School for Girls/ AlRasafa, First Directorate. The sample was chosen intentionally and was divided into two groups: a control group studying by the traditional method, their number (16), and an experimental group that applied the STEM approach, their number also (16). There was parity between the two research groups i

... Show More
View Publication
Scopus (62)
Crossref (14)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Inclined Magnetic Field of Non-uniform and Porous Medium Channel on Couple Stress Peristaltic Flow and application in medical treatment (Knee Arthritis)
...Show More Authors

The present study analyzes the effect of couple stress fluid (CSF) with the activity of connected inclined magnetic field (IMF) of a non-uniform channel (NUC) through a porous medium (PM), taking into account the sliding speed effect on channel walls and the effect of nonlinear particle size, applying long wavelength and low Reynolds count estimates. The mathematical expressions of axial velocity, stream function, mechanical effect and increase in pressure have been analytically determined. The effect of the physical parameter is included in the present model in the computational results. The results of this algorithm have been presented in chart form by applying the mathematical program.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
A Comparison of Sagittal Sections of Short T1inversion Recovery and T2 Weighted Fast Spin Echo Magnetic Resonance Sequences for Detection of Multiple Sclerosis Spinal Cord Lesions
...Show More Authors

Background: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement,

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Mechanisms of Social Change in the Era of Digital Communication and its Effects on the Communicative Message
...Show More Authors

When sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Axiology of Electronic programs in updating the methodology of information and communication sciences Tropes 8.4 Case Study
...Show More Authors

The study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (17)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref