Preferred Language
Articles
/
yxZGpYsBVTCNdQwCgtWK
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.

Scopus
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Journal Of Legal Sciences
Conditions for Presence of Personal Criminal Jurisdiction for Internal Security Forces Courts
...Show More Authors

          Reading Article First of Section 25 of Penal Trials Principles Law of Internal Forces Law makes us say that there are personal and objective regulations governing presence of jurisdiction of internal forces courts. It should be a source of law embodied by the personality of police as law in essence is a law of persons and the character of the perpetrator is not sufficient to determine jurisdiction of these courts. It should be linked with the subject condition, which completes the presence of jurisdiction for these courts, focusing on the essence of the crime and the interest to be protected by the criminal text with respect with the link between the crime and being a policeman. Thes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Audio Hiding in Color Image Using SLT Schemes
...Show More Authors

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Determination of some heavy metals in canned Sardines fish from Iraqi markets
...Show More Authors

present in the environment could constitute a hazard to food security and public health. These can be accumulated in aquatic animals such as fish.
Objective: In this study, selected heavy metals: Copper (Cu), Nickle (Ni), Chromium (Cr) and Iron (Fe) were evaluated in commercial canned fish products (Sardines) that are commonly consumed in Iraq. The canned fish (Sardine) which studied were Yacout Sardine (Morocco), Marina Sardine (Tunisia), Silver Sardine (Morocco) and Salsa Sardine (China).
Methods: Prospective study was done in Baghdad from January to June 2016 . 40 samples of four different foreign brands (10 samples for each brand were obtained): Yacout Sardine (Morocco), Marina Sardine(Tunisa), Silver Sardine (Morocco) and Sals

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 15 2021
Journal Name
Biochem. Cell. Arch.
CYTOKINES PROFILE FOR INTESTINAL AND SPLEEN HOMOGENATE FOR IMMUNOSUPPRESSANT BALB/C MICE INFECTED WITH CRYPTOSPORIDIUM PARVUM
...Show More Authors

Cryptosporidiosis is mainly cause a persistent diarrhea in immune compromised patients, BALB/c mice have been suppressed by dexamethasone, tissue Th1, Th2 and Th17 cytokines concentrations in the ileum were significantly diminished in both infected and immunosuppressed mice. Level of IFN-g, TNF-a, IL-12, IL-6, IL-17A was increased in level, IL-4 didn’t increases, in both ileal and spleen tissue. Levels of above cytokines were examined in spleen in order to follow the proliferation of CD4+ T-cell during C. parvum infection.

View Publication Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
On the G-quadratic and LG-quadratic of the Exterior Algebra and Associated Algebra
...Show More Authors

     Given an exterior algebra  over a finite dimension vector space v, and let   , where  is a graded ideal in . The relation between the algebra  and    regarding to -quadratic and - quadratic will be investigated. We show that the algebra   is - quadratic if and only if   is - quadratic. Furthermore, it has been shown that the algebra  is - quadratic if and only if  is - quadratic.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 12 2016
Journal Name
International Journal Of Advanced Statistics And Probability
Two fixed point theorems in generalized metric spaces
...Show More Authors

<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>

View Publication
Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fixed Point Theorem for Uncommuting Mappings
...Show More Authors

   In this paper we prove a theorem about the existence and uniqueness common fixed point for two uncommenting self-mappings which defined on orbitally complete G-metric space. Where we use a general contraction condition.
 

View Publication Preview PDF