Application of artificial intelligence to employ mathematical relations between numbers and their ranks in information security
Main Article Content
Abstract
The personal secret numbers of computers, portable devices, electronic protection systems and other security methods and digital encryption. In this paper, the mathematical relations between numbers and mattresses were discussed and highlighted. Artificial intelligence has been used to employ the properties that connect the numbers at intervals to be used in digital protection systems. These relationships were implemented in the field of information security through the use of MATLAB, and good results were obtained and the method was very effective.

Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
Maryam Inayat and others," A Survey on the Encryption Algorithms Used in Cell Phone Messages", International Journal of Emerging Technology and Advanced Engineering, Volume 6, Issue 2, 2017.
Jawad Raid Salih, Hamdani Ali. H. AL, Hamdi Sinan Salman (2016): Study of nano powder for improvement the mechanical properties of armor. Journal of Babylon University/ Engineering Sciences.
Jawaad Raid SAlih, Abdul Jabbar Safaa N. (2017): The Relation between Fibonacci sequence and (9, 19, and 29) numbers. RSJ International Journal of Computation and Applied Sciences IJOCAAS.
Al-Azawi AK Razi J., Jawad Raid S..(2017): Mathematical model of reliability of restored technical system. International Journal of Computation and Applied Sciences IJOCAAS.
Na Qi Jink Pan Qun Ding,"The Implementation of FPGA-based RSA Public-Key Application and Its Application in Mobile -Phone SMS Encryption System", IEEE International Conference on Instrumentation, Measurement, Computer, Communication and Control, 2011.
Hemlata Agrawal dna Narendra Kahtr ,"Image Encryption using Various Transforms-A Brief Comparative Analysis", IEEE, International Conference on Magnetics, Machines & Drives, 2014.
Al-Hamami, Alaa Hussein and Al-Ani, Saad Abdulaziz, "Information Security Technology and Protection Systems", First Edition, Dar Wael Publishing, Amman, 2007.
Safaa Nayyef AbdulJabbar1, Raid Salih Jawad2, Najat Hamid Sibit(2017): Numbers Seven relevance with, Six and Other Ranks,An Official Publication of "Sch. BuLl,Vol3),Iss(10), Oct, 2017.
.[9] Jawad R.S. (2016) : Novel mobile technique for high purity water production utilizing of nanotechnology with multi power resources. AR Patent C02F1/441.
Mohammed Sheikho Mamo, "Principles of Mobile Application Design," Dar Shuaa Publishing & Publishing, Syria [7], 2005.
Shatha A.M, Hiba Muneer M.Y. and Ruah M.A.(2018) Design a Hybrid Technique Based new Genetic approach for text Encryption,IJCSIS,Vol.16, No.1.
Rammanohar Das and Raghav Sandhane(2021) Artificial Intelligence in Cyber Security, July 2021,Journal of Physics Conference Series 1964(4):042072
Antonio J. G., Christian P., Klaus Sch., (2023), Artificial Intelligence-Based Cyber Security in the Context of Industry, Electronics 2023, 12, 1920. https://doi.org/10.3390/electronics12081920