About this Journal

The Journal of University of Anbar for Pure Science (JUAPS)  is the official scientific Biannual publication of the University Of Anbar. JUAPS is an international, multidisciplinary, peer review and open access journal. Earlier issues, launched 2007, were published under the title " Journal of University of Anbar for Pure Science (JUAPS)" with 3 issues per year. The Journal obtained many Acknowledgment Letters from the Iraqi Ministry of Higher Education and Scientific Research. Now Journal (JUAPS) publishes 2 issues per year.

PITTMAN MOTOR CONTROL USING NEURAL NETWORKS

WESAM M. JASIM

Journal of University of Anbar for Pure Science ,

Neural networks are well-suited for the modeling and control of complex physical systems because of their ability to handle complex input-output mapping without detailed analytical model of the systems . In this paper internal model control associated with proportional gain is used to control the system implemented with two neural networks , model of the system and inverse mode

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC

**MOHAMMED T. IBRAHEM SUFYAN T. FARAJ

Journal of University of Anbar for Pure Science ,

Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques. This is due to the complexity of using these secure e-mail systems and protocols. The complexity mainly arises from the difficulty associated with managing certificates and public keys. The main objective of this study was to find a solution that can make secure e-mail systems easier to use while maintaining the same level of security. This paper proposes a secure e-mail system that is based on the S/MIME standard where the public key and signature algorithms have been replaced by their Identity-Based Cryptography analogue algorithms. Using Identity-Based Cryptography has eliminated the need for digital certificates, and provided a solution to the usability problem present in the existing secure e-mail systems. Users can determine the public key of the recipient without having to contact any trusted third party, and can start encrypting or verifying messages as long as they have the public system parameters that can be publicly available. Users need to contact the Private Key Generator (PKG) only once in order to retrieve their private key before being able to decrypt or sign messages.

LINEAR CODE THROUGH POLYNOMIAL MODULO Z

MAKARIM ABDULWAHIDE

Journal of University of Anbar for Pure Science ,

A polynomial p(x)= a + a x + …+ a x is said to be a permutation polynomial over a finite ring R If P permute the elements of R . where R is the ring ( Z , + , ) . It is known that mutually orthogonal Latin of order n,where n is the element in Z generate A [ ] – error correcting code with n code words . And we found no a pair of polynomial defining a pair of orthogonal Latin square modulo Z where n = 2 generate a linear code.

STUDYING THE NUCLEAR STRUCTURE OF EVEN-EVEN DEFORMED GERMANIUM NUCLEUS

ALI KALAF AOBAID

Journal of University of Anbar for Pure Science ,

In the present work, the interacting boson model(IBM-1) for s and d boson is used to calculate the energy levels of the positive parity bands, electric quadrupole moments, E2-transition probabilities B(E2)in particular between states which may be affected by the finite boson number N=Nذ+Nُ=2+5=7 of even-even nucleus . This nucleus is belong to SU(5)-SU(3) dynamical symmetry . The calculated results of this study are compared with the available experimental data and they found to be in a very good agreement.

PITTMAN MOTOR CONTROL USING NEURAL NETWORKS

WESAM M. JASIM

Journal of University of Anbar for Pure Science ,

Neural networks are well-suited for the modeling and control of complex physical systems because of their ability to handle complex input-output mapping without detailed analytical model of the systems . In this paper internal model control associated with proportional gain is used to control the system implemented with two neural networks , model of the system and inverse mode

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC

**MOHAMMED T. IBRAHEM SUFYAN T. FARAJ

Journal of University of Anbar for Pure Science ,

Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques. This is due to the complexity of using these secure e-mail systems and protocols. The complexity mainly arises from the difficulty associated with managing certificates and public keys. The main objective of this study was to find a solution that can make secure e-mail systems easier to use while maintaining the same level of security. This paper proposes a secure e-mail system that is based on the S/MIME standard where the public key and signature algorithms have been replaced by their Identity-Based Cryptography analogue algorithms. Using Identity-Based Cryptography has eliminated the need for digital certificates, and provided a solution to the usability problem present in the existing secure e-mail systems. Users can determine the public key of the recipient without having to contact any trusted third party, and can start encrypting or verifying messages as long as they have the public system parameters that can be publicly available. Users need to contact the Private Key Generator (PKG) only once in order to retrieve their private key before being able to decrypt or sign messages.

LINEAR CODE THROUGH POLYNOMIAL MODULO Z

MAKARIM ABDULWAHIDE

Journal of University of Anbar for Pure Science ,

A polynomial p(x)= a + a x + …+ a x is said to be a permutation polynomial over a finite ring R If P permute the elements of R . where R is the ring ( Z , + , ) . It is known that mutually orthogonal Latin of order n,where n is the element in Z generate A [ ] – error correcting code with n code words . And we found no a pair of polynomial defining a pair of orthogonal Latin square modulo Z where n = 2 generate a linear code.

STUDYING THE NUCLEAR STRUCTURE OF EVEN-EVEN DEFORMED GERMANIUM NUCLEUS

ALI KALAF AOBAID

Journal of University of Anbar for Pure Science ,

In the present work, the interacting boson model(IBM-1) for s and d boson is used to calculate the energy levels of the positive parity bands, electric quadrupole moments, E2-transition probabilities B(E2)in particular between states which may be affected by the finite boson number N=Nذ+Nُ=2+5=7 of even-even nucleus . This nucleus is belong to SU(5)-SU(3) dynamical symmetry . The calculated results of this study are compared with the available experimental data and they found to be in a very good agreement.

PITTMAN MOTOR CONTROL USING NEURAL NETWORKS

WESAM M. JASIM

Journal of University of Anbar for Pure Science ,

Neural networks are well-suited for the modeling and control of complex physical systems because of their ability to handle complex input-output mapping without detailed analytical model of the systems . In this paper internal model control associated with proportional gain is used to control the system implemented with two neural networks , model of the system and inverse mode

STUDYING THE NUCLEAR STRUCTURE OF EVEN-EVEN DEFORMED GERMANIUM NUCLEUS

ALI KALAF AOBAID

Journal of University of Anbar for Pure Science ,

In the present work, the interacting boson model(IBM-1) for s and d boson is used to calculate the energy levels of the positive parity bands, electric quadrupole moments, E2-transition probabilities B(E2)in particular between states which may be affected by the finite boson number N=Nذ+Nُ=2+5=7 of even-even nucleus . This nucleus is belong to SU(5)-SU(3) dynamical symmetry . The calculated results of this study are compared with the available experimental data and they found to be in a very good agreement.

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC

**MOHAMMED T. IBRAHEM SUFYAN T. FARAJ

Journal of University of Anbar for Pure Science ,

Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques. This is due to the complexity of using these secure e-mail systems and protocols. The complexity mainly arises from the difficulty associated with managing certificates and public keys. The main objective of this study was to find a solution that can make secure e-mail systems easier to use while maintaining the same level of security. This paper proposes a secure e-mail system that is based on the S/MIME standard where the public key and signature algorithms have been replaced by their Identity-Based Cryptography analogue algorithms. Using Identity-Based Cryptography has eliminated the need for digital certificates, and provided a solution to the usability problem present in the existing secure e-mail systems. Users can determine the public key of the recipient without having to contact any trusted third party, and can start encrypting or verifying messages as long as they have the public system parameters that can be publicly available. Users need to contact the Private Key Generator (PKG) only once in order to retrieve their private key before being able to decrypt or sign messages.

Isolation and Identification of Klebsiella pneumoniae from Infants with Necrotizing Enterocolitis

Luma Abdalhady Zwain , Abdulkareem Anad Hmood

Journal of University of Anbar for Pure Science ,

Sixty four clinical isolates were collected from children with Necrotizing Enterocolitis admitted to the Children's Protection Hospital at the Medical City in Baghdad. These isolates included (41) stool samples, (14) blood samples and (9) urine samples for the period from 29/1/2018 to 4/4/2018. All the samples were cultured on MacConkey agar and Blood agar for diagnosis. All isolates were identified depending on macroscopic, microscopic, and biochemical tests, with Vitek-2 compact system. Forty three isolates were obtained from all samples; (26) isolates as Klebsiella pneumoniae (60.46%), 8 isolates as Escherichia coli (18.60 %), 4 isolates as Pseudomonas aeruginosa (9.30%), 2 isolates as Klebsiella oxytoca (4.65%), 2 isolates as Enterobacter cloacae (4.65%) and 1 isolate as Proteus hauseri (2.32%). The results showed that K. pneumoniae was the predominant in the samples taken from infants infected with Necrotizing Enterocolitis .

ATMOSPHERIC DRAG PERTURBATION EFFECT ON THE SATELLITES ORBITS

Abdul_Rahman Hussain Salih

Journal of University of Anbar for Pure Science ,

: In this paper the drag perturbation for the law orbit are studded ,Koll-method is suitable to used hear, equation of motion it's solved by numerical integration ;Rang-Kota-method was used ; to find the components of velocity and position and find the orbital parameters with perturbation .Study the effect of drag perturbation on the position , of satellite with time and on perigee , apogee , a ,e and age of satellite, Study the variation of satellite position and age with height we can increase the age of satellite to 40 times by increase the perigee height only 2 times, and by decrease A/m ratio and eccentricity also by rotate in the direction of the earth rotate.

Construction of Sylvester-Hadamard Matrices by Using Binary Code

Journal of University of Anbar for Pure Science ,

A simple method is presented which defines Sylvester-Hadamard matrices in terms of products of binary code. This method is based representation of natural number as binary code which take only two value 0 or 1. Such a Hadamard matrices generator can be used to find the spectral coefficients of Boolean functions.بلغة التشفير الثنائي . بنيت (Sylvester-Hadamard Matrices)

A Proposed Method for Achieving the Confidentiality of Arabic Texts

Yaseen Hikmat Ismaiel

Journal of University of Anbar for Pure Science ,

Due to the rapid development of distributed computing systems, the use of local networks, and the huge expansion of the Internet, the process of maintaining the confidentiality of information becomes important and necessary. Encryption is one of the most important ways to keep information confidential and to prevent unauthorized people from disclosing this information. Many cryptographic algorithms have appeared in different ways and methods. But most of these algorithms have been devoted for encrypting texts in the English language. Because of the increasing important and sensitive information exchange in the Arabic language by users on the Internet, an urgent need has appeared to build dedicated encryption systems for the Arabic language. The aim of this research is to provide a proposed encryption method that uses the idea of combining the methods of transposition and substitution cipher for the purpose of Arabic texts confidentiality. This research depends on using diacritics in the Arabic language to perform the process of substitution cipher. The efficiency of the proposed method has been tested on different texts; the method provides high speed execution, the length of the encrypted texts is almost close to the clear text length, and the confidentiality of the resulting encrypted texts is high.



Journal of University of Anbar for Pure Science


Publisher: University of Anbar
E-Mail:juaps@uoanbar.edu.iq
Editor-in-Chief: Prof. Abid Ali Thaker