Preferred Language
Articles
/
IhZIDIwBVTCNdQwCqvfe
USING A NEW METHOD TO INDUCE TARGETED GENETIC MUTATIONS IN POTATO VIRUS Y (PVY)
...Show More Authors

Scopus
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Spectroscopic studies of activated carbon fabricate from potato peel
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Applied Sciences And Nanotechnology
Microstructure Investigation of Activated Carbon Prepared from Potato Peel
...Show More Authors

Abstract This research investigates how activated carbon (AC) was synthesized from potato peel waste (PPW). Different ACs were synthesized under the atmosphere's conditions during carbonation via two activation methods: first, chemical activation, and second, carbon dioxide-physical activation. The influence of the drying period on the preparation of the precursor and the methods of activation were investigated. The specific surface area and pore volume of the activated carbon were estimated using the Brunauer–Emmett–Teller method. The AC produced using physical activation had a surface area as high as 1210 m2/g with a pore volume of 0.37 cm3/g, whereas the chemical activation had a surface area of 1210 m2/g with a pore volume of 0.34 c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
KEY TO THE SPECIES OF THE ORTHETRUM NEWMAN, 1833 (ODONATA, LIBELLULIDAE) WITH A NEW RECORD SPECIES IN IRAQ
...Show More Authors

This paper provides an identification key to the species of Orthetrum Newman, 1833 (Odonata, Libellulidae), including six species that were collected from different localities in Iraq.

 

    The species of O. anceps (Schneider, 1845) is registered as a new record in Iraq; the most important characters which are used in diagnostic key are included

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Association of a genetic variant (rs689466) of Cyclooxygenase-2 gene with chronic periodontitis in a sample of Iraqi population
...Show More Authors

Background: periodontitis is a chronic inflammatory disease causing destruction of the tooth supporting structures, initiated by dental plaque and modified by environmental and genetic risk factors. Cyclooxygenase-2 (COX-2) enzyme is responsible for the production of prostaglandin E2, an important mediator in the chronic periodontitis (CP) pathogenesis. Polymorphisms in COX-2 gene have linked to CP in different populations. Aim: To study the association between Cyclooxygenase-2 single nucleotide polymorphism rs689466 (-1195A/G SNP) and chronic periodontitis in a sample of Iraqi population. Methods: One hundred Iraqi subjects divided into two groups: case group consisted of 70 CP patient (35 males and 35 females) with age range 30-55 year

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Crossref
Publication Date
Mon Apr 06 2020
Journal Name
Asian Journal Of Civil Engineering
Integrated project delivery (IPD) method with BIM to improve the project performance: a case study in the Republic of Iraq
...Show More Authors

View Publication
Scopus (22)
Crossref (23)
Scopus Crossref
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering & Technology
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Evaluation water quality of Diyala River in Iraq using Bhargava method
...Show More Authors

Diyala River is a tributary of Tigris River, it is one of the important rivers in Iraq. It covers a total distance of 445 km (275 miles). 32600 km2is the area that drains by Diyala River between Iraqi-Iranian borders. This research aims to evaluate the water quality index WQI of Diyala River, where three stations were chosen along the river. These stations are D12 at Jalawlaa City at the beginning of Diyala River, the second station is D15 at Baaquba City at the mid distance of the river, and the third station is D17 which is the last station before the confluence of Diyala River with Tigris River at Baghdad city. Bhargava method was used in order to evaluate the water quality index for both irrigation and drink

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref