Preferred Language
Articles
/
pRdGPo4BVTCNdQwC8z5B
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Journal Of Real-time Image Processing
Fast and efficient recursive algorithm of Meixner polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Fri Feb 14 2014
Journal Name
International Journal Of Computer Applications
Parallelizing RSA Algorithm on Multicore CPU and GPU
...Show More Authors

View Publication
Crossref (10)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 03 2018
Journal Name
Al- Utroha Journal
Grice’s Maxims in British and American Conversation: A Comparative Study.
...Show More Authors

DBN Rashid, Al- Utroha Journal, 2018

View Publication
Publication Date
Mon Mar 30 2015
Journal Name
Nasaq Academic Scientific Journal
Violation of Quantity Maxim in Jane Austen's Pride and Prejudice
...Show More Authors

BN Rashid, Nasaq, 2015

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Research In Applied Linguistics
Flouting of Cooperative Principle in Jane Austen's Pride and Prejudice
...Show More Authors

DBN Rashid, Astra Salvensis, 2018 - Cited by 1

View Publication
Publication Date
Tue Aug 22 2023
Journal Name
Advances In Structural Engineering
Experimental and finite element analysis of reinforced concrete multi-cell box girders retrofitted with carbon fiber reinforced polymer strips under torsion
...Show More Authors

This study expands the state of the art in studies that assess torsional retrofit of reinforced concrete (RC) multi-cell box girders with carbon fiber reinforced polymer (CFRP) strips. The torsional behavior of non-damaged and pre-damaged RC multi-cell box girder specimens externally retrofitted by CFRP strips was investigated through a series of laboratory experiments. It was found that retrofitting the pre-damaged specimens with CFRP strips increased the ultimate torsional capacity by more than 50% as compared to the un-damaged specimens subjected to equivalent retrofitting. This indicated that the retrofit has been less effective for the girder specimen that did not develop distortion beforehand as a result of pre-loading. From

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Aug 22 2023
Journal Name
Advances In Structural Engineering
Experimental and finite element analysis of reinforced concrete multi-cell box girders retrofitted with carbon fiber reinforced polymer strips under torsion
...Show More Authors

This study expands the state of the art in studies that assess torsional retrofit of reinforced concrete (RC) multi-cell box girders with carbon fiber reinforced polymer (CFRP) strips. The torsional behavior of non-damaged and pre-damaged RC multi-cell box girder specimens externally retrofitted by CFRP strips was investigated through a series of laboratory experiments. It was found that retrofitting the pre-damaged specimens with CFRP strips increased the ultimate torsional capacity by more than 50% as compared to the un-damaged specimens subjected to equivalent retrofitting. This indicated that the retrofit has been less effective for the girder specimen that did not develop distortion beforehand as a result of pre-loading. From

... Show More
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF