Preferred Language
Articles
/
Xub2i5wBmraWrQ4daUs_
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our extensive studies indicated that our proposed encrypt and decrypt method provides increased security against hackers.

Scopus Crossref
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Mar 02 2026
Journal Name
International Journal Of Inventions In Engineering & Science Technology
A Review: Campus Violence Detection Using Deep Learning Models
...Show More Authors

This paper offers a systemic review of the deep learning methods to detect violence on campus, which is a critical issue in intelligent surveillance to improve the student safety and prompt cut off of violent accidents. The review reviews studies published 2018-2025, concentrating on model structure to detect fights, bullying, vandalism, and aggressive behavior on problematic campuses due to occlusion and light variations and complicated human interactions. The research design includes a comparative study of different deep learning networks, such as CNNs, RNNs, 3D CNNs, attention-based networks, transformers, graph neural networks, neuro-fuzzy, and multimodal systems and federated learning methods. The paper also assesses benchmark

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Ultra low power and highly linearized LNA for V-band RF applications in 180 nm CMOS technology
...Show More Authors

Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Power Versus Conventional Color Doppler Sonographic Diagnosis Of Acute Cholecystitis: Comparison In The Depiction Of Mural Flow
...Show More Authors

Background: Gray-scale sonography is generally
considered as a first-line diagnostic tool for patient with
suspected acute cholecystitis. It is suggested by gallstones,
Murphy's sign, thickening of the gallbladder wall and bile
sludging, but the specificity of these sonographic findings
are not as high as their sensitivity. Blood flow of the
gallbladder wall is increased in acute inflammation.
Objective: To evaluate the sensitivity and specificity of
power Doppler sonography and compared with conventional
color Doppler and gray-scale sonography in diagnosing
patients with acute cholecystitis.
Type of the study: This was a cross sectional study.
Patients and methods: The study was conducted t

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 06 2011
Journal Name
Journal Of Planner And Development
The strategies of sustainable urban management in the Islamic city according to binary ( the city and power)
...Show More Authors

Urban planning task and the control of constructional planning and urban management for cities considers the main tasks that the government takes care off. The paper discusses the concept of power from historical view of ancient Islamic cities to discover the strategies of urban management that the Islamic city adopt and to employ it in contemporary cities ,the more problems that modern cities suffer from which appears through poorness of urban context ,belongs to the loss of balance exists between the different faces of power that takes the tasks of urban management .therefore enhancement of urban environment is being through re-back that balance in administrative structures that make the cities go ahead . So the attention has b

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Al-khwarizmi Engineering Journal
Baghdad's University Solar Power Potentials: An Exploration with PVsyst and Helioscope at Al-Khwarizmi College of Engineering
...Show More Authors

Globally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref