Preferred Language
Articles
/
ijs-9589
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
REMOVAL OF PHENOLIC COMPUNDS FROM AQUEOUS SOLUTIONS BY ADSOPTION ONTO ACTIVTED CARBONS PREPARED FROM DATE STONES BY CHEMICAL ACTIVATION WITH FeCl3
...Show More Authors

Activated carbon prepared from date stones by chemical activation with ferric chloride (FAC) was used an adsorbent to remove phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) from aqueous solutions. The influence of process variables represented by solution pH value (2-12), adsorbent to adsorbate weight ratio (0.2-1.8), and contact time (30-150 min) on removal percentage and adsorbed amount of Ph and PNPh onto FAC was studied. For PNPh adsorption,( 97.43 %) maximum removal percentage and (48.71 mg/g) adsorbed amount was achieved at (5) solution pH,( 1) adsorbent to adsorbate weight ratio, and (90 min) contact time. While for Ph adsorption, at (4) solution pH, (1.4) absorbent to adsorbate weight ratio, and (120 min) contact

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Physical Education
The effect of using special intense exercise accompanied by intermittent electrical stimulation to get rid of lower neck pain among professors of the College of Science - University of Baghdad for ages (40-60) years
...Show More Authors

Lower neck pain is one of the problems facing all ages, especially the elderly, as it revolves around the causes of this pain from many diverse factors. The aim of the research is to use special intense exercise accompanied by intermittent electrical stimulation to get rid of lower neck pain among professors of the College of Science - University of Baghdad for ages. (40-60) years and to identify the extent of the effect. The research assumed the presence of statistically significant differences. The research sample represented professors at the University of Baghdad - College of Science who suffer from continuous pain for the period between (10/15/2023) and (1/15/) 2024) and their number is (5), The researchers used the experimenta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Nonlinear Analysis on Torsional Strengthening Of Rc Beams Using Cfrp Laminates
...Show More Authors

This research is devoted to investigate the behavior and performance of reinforced concrete beams strengthened with externally bonded Carbon Fiber Reinforced Polymer (CFRP) laminates under the effect of torsion. In this study a theoretical analysis has been conducted using finite element code ANSYS. Six previously tested beams are used to investigate reinforced concrete beams behavior
under torsion, two of them are solid and the rest are box-section beams. Also, two beams are without CFRP reinforcement, which are used as control beams for the strengthened one, and the other four beams are strengthened with CFRP laminates with different number of layers and spacing. Numerical investigation is conducted on these beams, and comparisons b

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Speech Emotion Recognition Using MELBP Variants of Spectrogram Image
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The Epistemological The Epistemological Foundations for Comparison of Religions by al-Amiri: The Epistemological Foundations for Comparison of Religions by al-Amiri
...Show More Authors

 

 Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)

The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?

The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 15 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
INHIBITORY EFFECT OF THYMOL EXTRACTS ON ENTEROTOXINS PRODUCTION BY Staphylococcus aureus.: INHIBITORY EFFECT OF THYMOL EXTRACTS ON ENTEROTOXINS PRODUCTION BY Staphylococcus aureus.
...Show More Authors

One hundred and eighty five urine samples were collected eight isolates (4.3%) were obtained and diagnosed as Staphylococcus aureus. Among 8 isolates, 5 (62.5%) S. aureus isolates were found to be enterotoxigenic, most of isolates produced at least two types of Staphylococcal enterotoxins (SEs). The production of enterotoxins in the presence or absence of Thymol extracts (aqueous and alcoholic) were estimated using a reversed passive latex agglutination (SET-RPLA) kit. The extracts reduced enterotoxin production compared with the control. Enterotoxin inhibition was observed for enterotoxin C production at minimal inhibitory concentrations (MIC) at 400 µg/ml, whereas production of enterotoxins A, B, and

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
World Journal Of Dentistry
Obturation of Lateral Canals by a New Reciprocating Spreader and a Conventional Finger Spreader by Lateral Condensation Technique: in vitro Comparative Study
...Show More Authors

View Publication
Scopus (2)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Producing Load Bearing Block Using LECA as Partial Replacement of Coarse Aggregate
...Show More Authors

The ability to produce load-bearing masonry units adopting ACI 211.1 mix design using (1:3.2:2.5) as (cement: fine aggregate: coarse aggregate) with slump range (25-50mm) which can conform (dimension, absorption, and compressive strength) within IQS 1077/1987 requirements type A was our main goal of the study. The ability to use low cement content (300 kg/m3) to handle our market price products since the most consumption in wall construction for low-cost buildings was encouraging. The use of (10 and 20%) of LECA as partial volume replacement of coarse aggregate to reduce the huge weight of masonry blocks can also be recommended. The types of production of the load-bearing masonry units were A and B for (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref