Preferred Language
Articles
/
bsj-3433
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Study the Impact of Silica Nanoparticles on the Properties of Several Dyes for the Fabrication of a Random Laser Gain Medium
...Show More Authors

Random laser gain media is synthesized with different types of dye at the same concentration (1×10-3 M) as an active material and silicon dioxide NPs (silica SiO2) as scatter centers through the Sol-Gel technique. The prepared samples are tested with UV–Vis spectroscopy, Fluorescence Spectroscopy, Field Emission Scanning Electron Microscopy (FESEM), and Energy Dispersive X-ray Diffraction (EDX). The end result demonstrates that doped dyes with silica nanoparticles at a concentration of 0.0016 mol/ml have lower absorbance and higher fluorescence spectra than pure dyes. FESEM scans revealed that the morphology of nanocrystalline silica is clusters of nano-sized spherical particles in the range (25-67) nm. It is con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Usage of non-linear programming in building a mathematical model for production planning according to discount constraints put on bought amount
...Show More Authors

Abstract

 This research deals will the declared production planning operation in the general company of planting oils, which have  great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm  application on non-linear model which been more difficulty than possible solution when imposed restric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Between Shrinkage &Maximum likelihood Method For Estimation Parameters &Reliability Function With 3- Parameter Weibull Distribution By Using Simulation
...Show More Authors

The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .

In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.

Note:- ns : small sample ; nm=median sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Constructing a Scale for the Nine Types of Students Personality: Constructing a Scale for the Nine Types of Students Personality
...Show More Authors

Abstract

The current research aims to construct a scale for the nine types of students’ personality according to Rob Fitzel model. To do this, (162) items were formed that present the nine types of personality with (18) items for each type. To test the validity of the scale, a sample of (584) students of Al-Mustansrya University were chosen. The data of their responses was analyzed by using factor analysis. The findings explored (9) factors as one factor for each type of personality with (12) items for each one. Then, the reliability of the scale was found by using the test-retest method and Alfa Cronbach method.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Simplified Novel Approach for Accurate Employee Churn Categorization using MCDM, De-Pareto Principle Approach, and Machine Learning
...Show More Authors

Churning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date.  A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the orig

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
A Comparative Study of a Moving Bed Biofilm Reactor and Bio-shaft Technology for a Wastewater Treatment Process: A review
...Show More Authors

In addition to the primary treatment, biological treatment is used to reduce inorganic and organic components in the wastewater. The separation of biomass from treated wastewater is usually important to meet the effluent disposal requirements, so the MBBR system has been one of the most important modern technologies that use plastic tankers to transport biomass with wastewater, which works in pure biofilm, at low concentrations of suspended solids. However, biological treatment has been developed using the active sludge mixing process with MBBR. Turbo4bio was established as a sustainable and cost-effective solution for wastewater treatment plants in the early 1990s and ran on minimal sludge, and is easy to maintain. This

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More