Preferred Language
Articles
/
rRZ_l4cBVTCNdQwC1VfG
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Computer Simulation for the Effects of Optical Aberrations on Solar Images Using Karhunen-Loeve polynomials
...Show More Authors

     Numerical simulations were carried out to evaluate the effects of different aberrations modes on the performance of optical system, when observing and imaging the solar surface. Karhunen-Loeve aberrations modes were simulated as a wave front error in the aperture function of the optical system. To identify and apply the appropriate rectification that removes or reduces various types of aberration, their attribute must be firstly determined and quantitatively described. Wave aberration function is well suitable for this purpose because it fully characterizes the progressive effect of the optical system on the wave front passing through the aperture. The Karhunen-Loeve polynomials for circular aperture were used to

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Compressive Strength of Bottle-Shaped Compression Fields of Fiber Reinforced Concrete Members
...Show More Authors

Applying load to a structural member may result in a bottle-shaped compression field especially when the width of the loading is less than the width of bearing concrete members. At the Building and Construction Department – the University of Technology-Iraq, series tests on fibre reinforced concrete specimens were carried out, subjected to compression forces at the top and bottom of the specimens to produce compression field. The effects of steel fibre content, concrete compressive strength, transverse tension reinforcement, the height of test specimen, and the ratio of the width of loading plate to specimen width were studied by testing a total of tenth normal strength concrete blocks with steel fibre and one normal s

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Design and Implementation of an IoT-based Transactional System for Quality Management
...Show More Authors

The spread of Coronavirus has forced populations around the globe to adopt strict measures such as lockdown, home quarantine, and home office. Moreover, in the current development of network communications, people can exploit internet and intranet features in many systems that need to be faster, more efficient, and available on time. Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without exertion and direct contact (i.e., in a contactless manner). These specifications can be used in a transaction system. This paper proposes an electronic transaction system (ETS) as a replacement for the curr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Double of the Emad - Falih Transformation and Its Properties with Applications
...Show More Authors

In this paper, we have generalized the concept of one dimensional Emad - Falih integral transform into two dimensional, namely, a double Emad - Falih integral transform. Further, some main properties and theorems related to the double Emad - Falih transform are established. To show the proposed transform's efficiency, high accuracy, and applicability, we have implemented the new integral transform for solving partial differential equations. Many researchers have used double integral transformations in solving partial differential equations and their applications. One of the most important uses of double integral transformations is how to solve partial differential equations and turning them into simple algebraic ones. The most important

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 11 2023
Journal Name
مجلة كلية الامام الاعظم
Provisions for inheritance of agricultural lands (transfer of the right to dispose of)
...Show More Authors

Agricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of inve

... Show More
Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of knowledge management in achieving strategic excellence Field research in some Iraqi private banks
...Show More Authors

The purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Kolmogorov Turbulent Simulations of Photon Limited Images of Binary Stars
...Show More Authors

The autocorrelation function calculations have been carried out on photon-limited computer-simulated images of binary stars that recorded through kolmogorov atmospheric turbulence. The effect of the parameters of photon limited binary star on the variation of signal to noise, signal to background ratios, number of images that processed and the magnitude of binary stars are studied and mathematic equations are given to investigate this effect. The result indicates that signal to background ratio of photon limited images of a binary star is independent of the total number of recorded photons.

 

View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Simulations of Four Types of Optical Aberrations using Zernik Polynomials
...Show More Authors

In this paper, a computer simulation is implemented to generate of an optical aberration by means of Zernike polynomials. Defocus, astigmatism, coma, and spherical Zernike aberrations were simulated in a subroutine using MATLAB function and applied as a phase error in the aperture function of an imaging system. The studying demonstrated that the Point Spread Function (PSF) and Modulation Transfer Function (MTF) have been affected by these optical aberrations. Areas under MTF for different radii of the aperture of imaging system have been computed to assess the quality and efficiency of optical imaging systems. Phase conjugation of these types aberration has been utilized in order to correct a distorted wavefront. The results showed that

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
IoT-Key Agreement Protocol Based on The Lowest Work-Load Versions of The Elliptic Curve Diffie-Hellman
...Show More Authors

     A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Spot Size on the Fractal Optical Modulation
...Show More Authors

The present paper analyzes the signal emitting from the Reticle during changing the spot size of laser falling on the disk and shows the optimum frequency and the amount of energy window in different patterns of modulator (Reticle).  All results are obtained by establishing   a special program named “Disk optical modulator version 3" using the language visual basic 6 ahich contains many parameters. All models of optical modulator consist of twenty sectors, ten sectors are opaque and other ten sectors are transmitted for the laser. The number of sectors depends on several factors as chopping frequency, power transparent and modulation transfer function.   It has been demonstrated by simulations, the optimal

... Show More
View Publication Preview PDF