Preferred Language
Articles
/
yhdaPo4BVTCNdQwCqz41
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Inventory Models With Pareto Distribution
...Show More Authors

Inventory or inventories are stocks of goods being held for future use or sale. The demand for a product in is the number of units that will need to be removed from inventory for use or sale during a specific period. If the demand for future periods can be predicted with considerable precision, it will be reasonable to use an inventory rule that assumes that all predictions will always be completely accurate. This is the case where we say that demand is deterministic.

The timing of an order can be periodic (placing an order every days) or perpetual (placing an order whenever the inventory declines to units).

in this research we discuss how to  formulating inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Diyala Journal For Pure Science
Correlated Hierarchical Autoregressive Models Image Compression
...Show More Authors

View Publication
Crossref
Publication Date
Sat Nov 15 2025
Journal Name
Philosophy Journal
Philosophy of Civilization Read and critique and analysis of the selected models
...Show More Authors

View Publication
Publication Date
Mon Dec 26 2011
Journal Name
Journal Of Intelligent Material Systems And Structures
Design and modeling magnetorheological directional control valve
...Show More Authors

Directional control valves are designed to control direction of flow, while actuators maintain required speeds and precise positions. Magnetorheological (MR) fluid is a controllable fluid. Utilizing the MR fluid properties, direct interface between magnetic fields and fluid power is possible, without the need for mechanical moving parts like spools. This study proposes a design of a four-way three-position MR directional control valve, presents a method of building, and explains the working principle of the valve. An analysis of the design and finite elements using finite element method of magnetism (FEMM) software was performed on each valve. The magnetic circuit of the MR valve was analyzed and the performance was simulated. The

... Show More
View Publication
Scopus (31)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Monitoring and Quality Control of Stud Welding
...Show More Authors

This study is conducted to carry out a straightforward way appropriate for quality monitoring and stability of arc stud welding process, followed by a number of procedures to control the quality of welded samples, namely torque destructive testing and visual inspection context.  Those procedures were being performed to support the monitoring system and verify its validity. Thus, continuous on-line monitoring guarantees earlier discovering stud welding defects and avoiding weld repeatability. On-line welding electronic monitoring system is for non destructive determining if a just completed weld is satisfactory or unsatisfactory, depending on welding current peak value detected by the system. Also, it has been observed significant ha

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
New Concepts of Fuzzy Local Function: Types of fuzzy local function
...Show More Authors

The main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied

View Publication Preview PDF
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Probability Concepts of Transfer Load to the Foundation of Container Structure
...Show More Authors

This paper presents stochastic analysis using the perturbation method to model the structure of a container to verify the distributions of probability of maximum and minimum axial forces reactions in piles. The proposed simulation of a container port terminal under 11 scenarios of load combinations was presented. The probability distributions for live loads are assigned according to the input parameters of simulation data. Part of the load itself is implicitly combined such as vertical live load which includes the weight of equipment and containers and wind load. The structural model was simulated in the software STAAD Pro., while the statistical analyses were performed with MATLAB. The results demonstrated that, the most significant extern

... Show More
Scopus (5)
Crossref (4)
Scopus Crossref