Preferred Language
Articles
/
rRZ_l4cBVTCNdQwC1VfG
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jul 21 2025
Journal Name
Hammurabi Journal For Studies
(The impact of legislative drafting on the achievement of electoral justice)
...Show More Authors

View Publication
Publication Date
Sat Jun 01 2013
Journal Name
Int. J. Nanoelectronics And Materials
The response of a window glass to the frequencies of sound
...Show More Authors

Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Energy Reports
Study of photoemission and electronic properties of dye-sensitized solar cells
...Show More Authors

We have investigated the photoemission and electronic properties at the PTCDI molecules interface on TiO2 and ZnO semiconductor by means of charge transition. A simple donor acceptor scenario used to calculate the rate for electron transfer of delocalized electronics in a non-degenerately TiO2 and ZnO electrodes to redox localized acceptors in an electrolytic. The dependent of electronic transition rate on the potential at contact of PTCDI with TiO2 and ZnO semiconductors, it has been discussion using TiO2 and ZnO electrodes in aqueous solutions. The charge transfer rate is determining by the overlapping electronic coupling to the TiO2 and ZnO electrodes, the transition energy, potential and polarity media within the theoretical scenario of

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
Geological Model of the Tight Reservoir (Sadi Reservoir-Southern of Iraq)
...Show More Authors

A3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.

Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.

Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Doppler Phenomenon on the Speed of Blood Flow
...Show More Authors

This research studying the phenomenon of Doppler (frequency Doppler) as a method through which the direction and speed of the blood cells flows in blood vessels wear measured. This Doppler frequency is relied upon in medicine for measuring the speed of blood flow, because the blood flow is an important concept from the concepts of medicine. It represents the function and efficient of the heart and blood vessels in the body so any defect in this function will appear as a change in the speed of blood flow from the normal value assumed. As this speed changes alot in cases of  disease and morbidity  of the heart, so in order to identify the effect of changing the Doppler frequency on the speed of blood flow and the relationship of

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The reality of Taxation in Iraq and Aspect of it’s Development
...Show More Authors

This research is considered a simple attempt and effort which is it first and last target is to point at the procedures of the taxes account that aims to reduce the taxes from the persons and give free to the person who estimates the tax to practice what comes from the competent authorities to describe the person who estimates the tax and not an accountant who practice the accountant procedures which are imposed on him by the annual terms from higher administrations , So he can not evaluate   state of the person who pay the tax , and he might be dissatisfied with his job , because his role can’t  be activated from the general foundation taxes.

And so , this research includes four fields:-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Theoretical Analysis of Concentric Flow of Spherical Capsule in Laminar Flow
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Iraqi Journal Of Applied Physics
Fabrication and Improvement of Optoelectronic Properties of Copper Chalcogenide Thin Films
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Science
Antibiofilm activity of klebocin crude extract against some species of Enterobacteriaceae
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref