Preferred Language
Articles
/
oRc7FY4BVTCNdQwCADF3
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.

Publication Date
Thu Feb 01 2024
Journal Name
Ain Shams Engineering Journal
Performance enhancement of high degree Charlier polynomials using multithreaded algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biodiversity and Genetic Relationships to the Species for the genus Gladiolus L. (Iridaceae) Wild Growing in Iraq Using RAPD-PCR Technique
...Show More Authors

This study observed the genetic diversity and relationships among 4 species belonging to genus Gladiolus L. , by using the Random  Amplified Polymorphic DNA (RAPD) technique , the study  includes extraction of genomic DNA from the dray leaves by using commercial kit . 4 random primers  used the produced of many polymorphic bands among the 4 species , it was also possible to fined the DNA fingerprint of all studied species.Through the appearance of a number of bands that were unique to each species.Genetic distances ranged from 0.10 to 0.86, and used cluster  analysis were performed to construct dendrogram.Cluster analysis grouped the 4 species Into tow main clusters depending on their ancestor and their morphological

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic variation between wild type and auxotrophic mutant isolates of Sinorhizobium meliloti by using RAPDPCR technique
...Show More Authors

SGI2 wild type isolate of Sinorhizobium meliloti was isolated from Medicago sativa (alfalfa) plant which was obtained from Al-Tarmiaa region / Baghdad. Nine auxotrophic mutants were obtained from the SGI2 wild type isolate by mutagenesis with Nitrous acid (HNO2). The SGI2 wild type and the all auxotrophic mutant isolates had two Megaplasmids; pSymA and pSymB. No genetic variations in plasmid number and size were detected when gel electrophoresis was done for plasmid profile detection. Genetic variations by using RAPD-PCR technique were obtained between wild type and auxotrophic mutant isolates. One band was detected in SGI6 gel profile with 1.5 Kb size when OPY-04 primer was used. Using OPB7 primer by using RAPD-PCR technique showed larg

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Data Aggregation in Wireless Sensor Networks Using Modified Voronoi Fuzzy Clustering Algorithm
...Show More Authors

Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 26 2024
Journal Name
World Electric Vehicle Journal
Fast Finite-Time Composite Controller for Vehicle Steer-by-Wire Systems with Communication Delays
...Show More Authors

The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Arabic
...Show More Authors

Summary
This study seeks to clarify the phenomena of polyphony, as Oswald Ducrot indicated that polyphony is an extension of linguistics, and worked to link it to vocalisation which contains vocable ends, which led Ducrot to a similar example between (speaker and vocable). He indicated that the speaker was responsible for the pronunciation In the speech, and its phenomena: dialectical denial, irony, and referral references, which came to highlight the pragmatics texts and then explain the phenomena of semantic blocks and examples in Naguib Mahfouz's novels and stories.

View Publication Preview PDF
Publication Date
Fri Apr 20 2012
Journal Name
International Journal Of Computer And Information Engineering
An Optimal Algorithm for HTML Page Building Process
...Show More Authors

An Optimal Algorithm for HTML Page Building Process

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref