Preferred Language
Articles
/
oBb-e4kBVTCNdQwCDIqA
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption
...Show More Authors

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images.

So, this study aimed at testing the system performance at poor s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Proposed Introduction to Activate the Role of Accounting System for Political Parties in Iraq
...Show More Authors

     Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Title Semiotic in Creative Texts
...Show More Authors

Contemporary researchers realized the importance of the title. Many researches and studies concerned in titles and their analyses on the structural, semantic and pragmatic levels have been developed. Title gives a vital assistance to control the text harmony and to understand its vague aspects. It is the axis which re-generates itself, grows, and re-produces itself; as if it were a head for a body.

Title has strong relation to the reader- waiting horizon, multiplies as many levels of understanding are there. The horizon of waiting is limited by the title, basically, to be the first reason for the text entrance, as the first thing attracts the reader is the title.

Approaching title scientifically and objectively is impossi

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
Exercises based on the phosphogenic energy system to develop the ability to perform with precision and accuracy
...Show More Authors

Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle

... Show More
Crossref (1)
Crossref