Preferred Language
Articles
/
IIYtroYBIXToZYAL0aRH
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref
Publication Date
Wed Nov 22 2017
Journal Name
Farm Machinery And Processes Management In Sustainable Agriculture, Ix International Scientific Symposium
INFLUENCE OF PHYSICAL PROPERTIES OF WATER-ADJUVANT MIXTURE ON THE DROPLET STAINS DEPOSITING ON AN ARTIFICIAL TARGET
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Shape of Round house as an Effective Strategy in the Collection of Art Education Students
...Show More Authors

The two researchers selected the problem of research which represented with the following asking: Does the use of the shape of Round house strategy have effectiveness in the collection of students of the Department of Art Education of the subjectof teaching methods?
The research aims to "measure the effectiveness of Strategy shape of Round house in the collection of students of the Department of Art Education for the material teaching methods" and to verify the aim of the research two zeroassumptions was identified to measure the level of achievement in the subject of teaching methods of third stage students in the Department of Art Education –College of Fine Arts.
The research community included the students of Art Education Dep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Geological Journal
RADON GAS AND EFFECTIVE DOSE IN GROUNDWATER IN ABU- JIR VILLAGE IN ANBAR, WESTERN IRAQ
...Show More Authors

In the present study, radon gas concentration in the shallow groundwater samples of the Abu-Jir region in Anbar governorate was measured by using Rad-7 detector. The highest radon gas level in the samples is up to 9.3 Bq/L, while the lowest level is 2.1 Bq/L, with an average of 6.44±1.8 Bq/L. The annual effective dose is varied from 33.945 μSv/y to 7.66 μSv/y, with an average of 0.145±0.06 μSv/y. Consequently, the radon level in the groundwater studied is lower than the standard recommended value (11 Bq/L) reported by the United States Environmental Protection Agency (USEPA). The potential source of radon is uranium-rich hydrocarbons that are leakage to the surface along the Abu-Jir Fault. This research did not indicate any ris

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Crisis management effective of business organizations in the era of managerial technique: a philosophical study
...Show More Authors

At a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication