Preferred Language
Articles
/
Xub2i5wBmraWrQ4daUs_
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our extensive studies indicated that our proposed encrypt and decrypt method provides increased security against hackers.

Scopus Crossref
View Publication
Publication Date
Thu Oct 07 2021
Journal Name
Bioremediation Journal
Bioremediation of real-field slaughterhouse wastewater associated with power generation in algae-photosynthetic microbial fuel cell
...Show More Authors

View Publication
Crossref (8)
Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Numerical Simulation of the Collector Angle Effect on the Performance of the Solar Chimney Power Plant
...Show More Authors

Sloped solar chimney system is a solar chimney power plant with a sloped collector. Practically, the sloped collector can function as a chimney, then the chimney height can be reduced and the construction cost would be reduced.The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady, turbulent standard model with Boussiuesq approximation  to develop for the sloped solar chimney system in this study and evaluate the performance of solar chimney power plant  in Baghdad city of Iraq numerically by Fluent (14) software with orking conditions such as solar radiation intensity (30

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Aip Conference Proceedings
The electrical conductivity and thermoelectric power dependence on the thicknesses for thermally deposited thin CdS films
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Comparison of the RLS and LMS Algorithms to Remove Power Line Interference Noise from ECG Signal
...Show More Authors

    Biomedical signal such as ECG is extremely important in the diagnosis of patients and is commonly recorded with a noise. Many different kinds of noise exist in biomedical environment such as Power Line Interference Noise (PLIN). Adaptive filtering is selected to contend with these defects, the adaptive filters can adjust the filter coefficient with the given filter order. The objectives of this paper are: first an application of the Least Mean Square (LMS) algorithm, Second is an application of the Recursive Least Square (RLS) algorithm to remove the PLIN. The LMS and RLS algorithms of the adaptive filter were proposed to adapt the filter order and the filter coefficients simultaneously, the performance of existing LMS

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication
Publication Date
Sun Sep 15 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Novel Candidate Single Nucleotide Polymorphisms of ERCC2 Gene that Influence Colorectal Cancer Susceptibility
...Show More Authors

Colorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t

... Show More
Preview PDF
Scopus Crossref
Publication Date
Mon Oct 16 2006
Journal Name
No Journal
Novel Metal Complexes of Tetradentate Ligands Type N2S2 Synthesis and Physico-Chemical Characterisation
...Show More Authors

This study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.