Preferred Language
Articles
/
bsj-1325
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The concept of stigma and its representations in the Arab theatrical text (The Sultan, Al-Ha'ir play, by choice): نزار شبيب كريم - علاء حاتم محسن
...Show More Authors

The research deals with the concept of stigma as one of the important phenomena that cast a shadow over the nature of the individual, his being and his personality through the inferior view with which he confronts in society, and (Sartors) indicates in this regard that stigma may lead to negative discrimination that leads to many defects, in terms of obtaining On care, poor health, service, and frequent setbacks that can damage self-esteem. The first roots of this phenomenon go back to the Greek civilization and what the Greeks used to burn and cut off some parts of the body and then announce to the nation that the bearer of this sign is a criminal. In addition to the Arab peoples living from setbacks that contributed to the exacerbation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Contemporary experimental currents and its impact on the structure of the contemporary Iraqi theatrical text "The epic theater as a model": هيثم حمزة سلمان الحمداني
...Show More Authors

  In this research study, I tried to trace the epic effect to learn how it was understood and how it was used. Following the descriptive and analytical approach in the research, the first chapter dealt with a presentation of the methodological framework of the problem, the goal, the limits of the research, the importance and the need for it and the definition of terms, as well as the theoretical framework which consisted of two topics, including the impact of the epic theater on the world theater and the second the effect of the epic theater on the Arab theater, This came by tracing the epic impact on the world stage of the Greeks, the Middle Ages, the Renaissance, and the Arab theater of the twentieth century.
As for the second

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
News website Analytical: study of news sites (Iraqi Media network, The Seventh Day,Huffington Post Arabic
...Show More Authors

This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Apr 15 2020
Journal Name
Journal Of Engineering Science And Technology
INFLUENCE OF A RIVER WATER QUALITY ON THE EFFICIENCY OF WATER TREATMENT USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Publication Date
Mon Oct 01 2018
Journal Name
Conference: First International Conference On Water Resources
Modeling BOD of the Effluent from Abu-Ghraib Diary Factory using Artificial Neural Network October 2018
...Show More Authors

The proper operation, and control of wastewater treatment plants, is receiving an increasing attention, because of the rising concern about environmental issues. In this research a mathematical model was developed to predict biochemical oxygen demand in the waste water discharged from Abu-Ghraib diary factory in Baghdad using Artificial Neural Network (ANN).In this study the best selection of the input data were selected from the recorded parameters of the wastewater from the factory. The ANN model developed was built up with the following parameters: Chemical oxygen demand, Dissolved oxygen, pH, Total dissolved solids, Total suspended solids, Sulphate, Phosphate, Chloride and Influent flow rate. The results indicated that the constructed A

... Show More
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Optical Fiber Technology
Optical fiber sensor network integrating SAC-OCDMA and cladding modified optical fiber sensors coated with nanomaterial
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Modern Sport
The impact of the question network strategy in accordance with mental capacity in the strength of cognitive control in the subject of teaching methods of sports education for undergraduate students
...Show More Authors

The study aimed at identifying the mental capacity of the research sample and classifying them for the purposes of the study, preparing the scale of cognitive control of the subject of teaching methods of sports education, preparing educational units by establishing the question network for the subject of the teaching methods of sports education, and adopting the experimental method by experimental design workers (2×2) for the two groups The limits of the research community are represented by third-stage students of the Department of Physical Education and Sports Science in the morning study of the College of Knowledge, the Community University, which continues in the regular working hours of the year (2019-2020) adult Their number

... Show More
View Publication Preview PDF
Crossref (2)
Crossref