Preferred Language
Articles
/
DRcrPo8BVTCNdQwChGUG
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.

Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 08 2025
Journal Name
Nanomaterials
High-Temperature Properties of Hot Mix Asphalt Modified with Different Nanomaterials
...Show More Authors

Rutting is a predominant distress in asphalt pavements, particularly in hot climatic regions. This study systematically investigated the high-temperature performance of hot mix asphalt modified with five nanomaterials, namely, nano-silica (NS), nano-alumina (NA), nano-titanium (NT), nano-zinc (NZ), and carbon nanotubes (CNTs), under consistent laboratory conditions. Modification dosages were selected up to 10% for NS, NA, and NT, and up to 5% for NZ and CNTs. The experimental methodology comprised the following: (i) binder rheological characterization through rotational viscosity, G*/sinδ, and multiple stress creep recovery (MSCR) to quantify rutting susceptibility; (ii) chemical and microstructural assessments using Fourier transf

... Show More
View Publication
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust estimation of multiple linear regression parameters in the presence of a problem of heterogeneity of variance and outliers values
...Show More Authors

Often times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Transactions On Robotics
Lidar-Level Localization With Radar? The CFEAR Approach to Accurate, Fast, and Robust Large-Scale Radar Odometry in Diverse Environments
...Show More Authors

View Publication
Scopus (39)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of The Microleakage of Polyacid Modified Composite Compared to Hybrid Composite and Resin Modified Glass Ionomer Cement in Primary and Permanent Teeth Restoration (An in vitro study)
...Show More Authors

Background: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant: Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant
...Show More Authors

The surplus glycerol produced from biodiesel production process as a by-product with high quantity can be considered as a good source to prepare glycerol carbonate (GC) whereas with each 1000 kg from biodiesel obtains 100 kg from glycerol. Glycerol converted to glycerol carbonate over bio-char as a catalyst prepared by slow pyrolysis process under various temperatures from 400 ᴼC to 800 ᴼC. The char prepared at 700 ᴼC considered as a best one between the others which was manufactured to activate the transesterification reaction. GC have large scale of uses such as liquid membrane in gas separation, surfactants ,detergents , blowing agent , in plastics industry, in  Pharmaceutical industry and electrolytes in lithium batteries.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The effect of technology on achieving contemporary levels in the space of Arab Islamic architecture “Mosques is a case study”
...Show More Authors

Arab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Robust Queues Models and its Role in Improving Performance in the City of Medicine / Baghdad Teaching Hospital / Clinic Internal Medicine Advisory
...Show More Authors

The purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values ​​or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Photostability Study of Some Modified Poly(vinyl chloride) Containing Pendant Schiff’s Bases
...Show More Authors

The polymers modified Poly(vinyl chloride) differ in their tendency to photo oxidation comparing with that unmodified. It has been studied Photostability for modified Poly(vinyl chloride) chains using Schiff’s bases derivative of (5-amino-1, 3, 4-thiadiazole-2-thiol) in a manner casting of plastic chips with thickness (40) in a solvent Tetrahydrofuran. It has been determined the effectiveness Photostability of these modified polymers through the photo degradation rate constant for photostabilizer (kd) for the modified Poly (vinyl chloride). Attributed efficiency of these Poly(vinyl chloride) chips in Photostability by replace the atom Cl Poly(vinyl chloride) chains ends more stable than light stabilizer.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Communications Letters
Modified Blind Source Separation for Securing End-to-End Mobile Voice Calls
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref