Preferred Language
Articles
/
oRc7FY4BVTCNdQwCADF3
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.

Publication Date
Sat Jan 19 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
ECONOMICAL BEHAVIOR ANALYSIS OF AGRICULTURAL COMPANIES IN IRAQ USING TRANSLOG COST FUNCTION
...Show More Authors

This research aims to identify the productive relationship nature among the elements used in the agricultural companies by estimating the translog cost function. It also aims to recognize the possibility of substituting these elements with each other, to identify the nature of revenues, and economies scale through elasticity of other cost. This research goes further to define the typical use of resources, identify the performance of the companies and their contribution in controlling their cost, and estimating elasticity of substitution (Allen-Uzawa), (Morishima).  The translog cost function was estimated so as the total cost of the agricultural companies is a function of the prices of production and production quantity output  el

... Show More
View Publication
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (42)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Prediction of the number of births in the Governorate of Basra for the period (1998-2050)
...Show More Authors

The adoption of many mathematical concepts contributes to the construction of models of sports and the population can be interpreted to explain the movement and growth of the population lead to proper planning to manage the requirements of the population and meet their needs of providing education or providing medical services, health and others. In this study, the number of births in the Governorate of Basrah for the period (1998-2050) is estimated to be based on the assumption that the population of the visually impaired is a stable society. If the rate of growth is (0.0492), some demographic indicators are important for maintaining the average age of women at pregnancy (27.817). Each woman will give birth (3.74) female birth d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Peripheral Perception And its Relation With The Need for Cognition for The University Students
...Show More Authors

The most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Computer Science And Information Security (ijcsis)
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining
...Show More Authors

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp

... Show More
Preview PDF
Publication Date
Wed Jul 13 2016
Journal Name
International Journal Of Mathematics Trends And Technology
Designed Algorithms for Compute the Tenser Product of Representation for the Special Linear Groups
...Show More Authors

The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Thinking Styles And Its Relationship With The Need for Cognitive for Students of University
...Show More Authors

This study aims to recognize the most common thinking styles and level of the need for cognitive university students , the relation between thinking styles and the need for cognitive, and there are differences according to gender .The sample consists of (250) males and females university students for the academic year (2013-2014), and the researcher uses two scales;" thinking styles scale (Harison &Bramson, 1986), and the need for cognitive scale" (Cacioppo, Petty & Kao , 1996).
The results show that there is difference in the range of the prevalence of the thinking styles among university students , the scientific thinking style is the most common , the students have got the arrange level of the need for cognitive , and there

... Show More
View Publication Preview PDF