Preferred Language
Articles
/
WhbcCocBVTCNdQwCGjKo
Developing a system for assessing the sustainability in school building projects
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The effect of the probing questions in the collection of literature for students of the Kurdish language department in the College of Education / Ibn Rushd for the Humanities
...Show More Authors

    The goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample  reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded r

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Theatrical Visual System between the Cultural Identity and Globalization Culture Iraqi Theatre as Case Study
...Show More Authors

Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
Effect of cold atmospheric plasma on the wound of diabetic rats by FE-DBD system
...Show More Authors

This study explains the effect of non-thermal (cold) plasma on wound of diabetic rats by (FE-DBD) system, 3cm probe diameter is used. The output power was ranged from (12-20) W. The effect of non-thermal plasma on wounds of a diabetic was observed with different exposure durations (20,30) sec., the plasma exposure duration decreases the sugar level in blood and the diameter of the wound. These results indicate the cold plasma can be used to enhance the insulin level (i.e., blood sugar) and wounds treatment.

View Publication
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A stuy Some physical properties for play (vunyl alcohol) in aquecous solution at four temperatures
...Show More Authors

The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical investigation for Natural Convection in a square Enclosure with partially active thermal sides' wall
...Show More Authors

Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.

Scopus
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lvi междунар. науч.-практ. конф. – No 2 (56). – М
Comparative analysis of zoomorphic metaphors in Russian and Arabic as a method for studying linguoculturology
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Preview PDF