Preferred Language
Articles
/
D_q3sJkBMF18lwyZa81L
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.

Crossref
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of Models (NAGARCH & APGARCH) by Using Simulations
...Show More Authors

Simulation experiments are a means of solving in many fields, and it is the process of designing a model of the real system in order to follow it and identify its behavior through certain models and formulas written according to a repeating software style with a number of iterations. The aim of this study is to build a model  that deals with the behavior suffering from the state of (heteroskedasticity) by studying the models (APGARCH & NAGARCH) using (Gaussian) and (Non-Gaussian) distributions for different sample sizes (500,1000,1500,2000) through the stage of time series analysis (identification , estimation, diagnostic checking and prediction). The data was generated using the estimations of the parameters resulting f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Reducing Lost Circulation Problem by Using Rice Material
...Show More Authors

Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.

    Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.  

    This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.

     The experim

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Estimation of Bladder pressure by using poiseuilles equation
...Show More Authors

Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Craniofacial Surgery
Single Session Facial Lipostructure by Using Autologous Fat Mixed With Platelet-Rich Fibrin Injected by Using Facial Autologous Muscular Injection Technique
...Show More Authors
Aim:

This study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.

Materials and Methods:

Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).

Auto

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jul 05 2018
Journal Name
Eurasip Journal On Wireless Communications And Networking
Positioning and guiding educational robots by using fingerprints of WiFi and RFID array
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref