Preferred Language
Articles
/
yhdaPo4BVTCNdQwCqz41
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Maced J Med Sci.
Past Myocardial Infarctions and Gender Predict the LVEF Regardless of the Status of Coronary Collaterals: An AI-Informed Research. Open Access Maced …
...Show More Authors

BACKGROUND: The degree of the development of coronary collaterals is long considered an alternate–that is, a collateral–source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty.

Publication Date
Sun Apr 02 2023
Journal Name
Journal Of Oral Microbiology
Current concepts in the pathogenesis of periodontitis: from symbiosis to dysbiosis
...Show More Authors

View Publication Preview PDF
Crossref (26)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
New Concepts of Fuzzy Local Function: Types of fuzzy local function
...Show More Authors

The main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied

View Publication Preview PDF
Scopus (16)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
THE MEENTAL FACTS CONCEPTS IN THE (1408) FILM: حيدر صبري جعفر
...Show More Authors

The location element indispensable in the film, it is the container that meets the all the elements of the artwork, and place in the cinema topic or space as the existence of a material perceptible senses, is one of the key elements in the drama because he is one of the conditions to achieve supply drama which, with the nature of the vehicle because it is linked to reality the real and the reality of mental imagined, and returns the importance of the place mentally to change the pattern in the building's traditional place in the world of the film, is that the space under the facts of the events imagined or mental and determined by the processors directorial, and where mental in the movies but found himself a world with a pace sometimes s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Journal Of Oral Microbiology
Current concepts in the pathogenesis of periodontitis: from symbiosis to dysbiosis
...Show More Authors

View Publication
Crossref (226)
Crossref