Preferred Language
Articles
/
DRcrPo8BVTCNdQwChGUG
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.

Publication Date
Mon Sep 03 2012
Journal Name
The International Archives Of The Photogrammetry, Remote Sensing And Spatial Information Sciences
CALIBRATION OF FULL-WAVEFORM ALS DATA BASED ON ROBUST INCIDENCE ANGLE ESTIMATION
...Show More Authors

Abstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration r

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Robust Estimations of Cluster Analysis: Practical Application in Administrative and Financial Corruption
...Show More Authors

Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.           

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
Comparative Analysis of Two Robust Strategies for an Angular Velocity Control System
...Show More Authors

In this paper, a novel flow control strategy which is the inlet throttled pump was used to design an angular velocity control system for rotary actuator. Inlet throttled systems have good performance in addition to their high efficiency compared to traditional valve controlled systems. The flow in the proposed system is adjusted by a valve that is positioned at the pump inlet with the purpose of reducing the energy loses across the valve. This regulated flow is used then to control the actuator angular velocity. The system was modeled and the open loop stability and performance were studied. In order to improve the system performance, Robust-Proportional-Integral-Derivative (RPID) and structured singular value (M@#@) controllers have been d

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Nov 12 2025
Journal Name
2025 7th International Conference On Control Systems, Mathematical Modeling, Automation And Energy Efficiency (summa)
Comparative Analysis of Robust Strategies for an Electro-hydraulic Servo Valve System
...Show More Authors

PID (proportional-integral-derivative) and Mu controllers are widely used in electro-hydraulic servo systems due to their effectiveness and ease of implementation. This paper explores using particle swarm optimization (PSO) for tuning traditional and robust PID controllers, along with D-K iteration for Mu controller tuning. Three controller types: conventional PID (CPID), robust PID (RPID), and structured singular value controllers are developed, while analyzing multiplicative uncertainty with six uncertain coefficients. Their findings indicated that both PID (CPID and RPID) and Mu controllers maintained system stability. Notably, the Mu controller can handle coefficient uncertainty without a pure integral term, while the RPID controller de

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Ieee Transactions On Systems, Man, And Cybernetics: Systems
Design of Robust Terminal Sliding Mode Control for Underactuated Flexible Joint Robot
...Show More Authors

Flexible joint robot (FJR) manipulators can offer many attractive features over rigid manipulators, including light weight, safe operation, and high power efficiency. However, the tracking control of the FJR is challenging due to its inherent problems, such as underactuation, coupling, nonlinearities, uncertainties, and unknown external disturbances. In this article, a terminal sliding mode control (TSMC) is proposed for the FJR system to guarantee the finite-time convergence of the systems output, and to achieve the total robustness against the lumped disturbance and estimation error. By using two coordinate transformations, the FJR dynamics is turned into a canonical form. A cascaded finite-time sliding mode observer (CFTSMO) is construct

... Show More
View Publication
Scopus (189)
Crossref (178)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Case Studies In Thermal Engineering
Robust composite temperature control of electrical tube furnaces by using disturbance observer
...Show More Authors

As one type of resistance furnace, the electrical tube furnace (ETF) typically experiences input noise, measurement noise, system uncertainties, unmodeled dynamics and external disturbances, which significantly degrade its temperature control performance. To provide precise, and robust temperature tracking performance for the ETF, a robust composite control (RCC) method is proposed in this paper. The overall RCC method consists of four elements: First, the mathematical model of the ETF system is deduced, then a state feedback control (SFC) is constructed. Third, a novel disturbance observer (DO) is designed to estimate the lumped disturbance with one observer parameter. Moreover, the stability of the closed loop system including controller

... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Inspiration Of Typed Paintings From Folk Architecture In Asir Region: مريم محمد العمري
...Show More Authors

  This research aims to realize one of the pillars of Saudi vision (2030) through searching for new sources full of material folklore that had not previously been studied, so this study will study folk motifs engraved on the doors and windows in the Bani Amru Center in the Al-Namas governorate that is situated in the Asir region , in particular the tribe (Bani Rafe), before being disappeared due to the abandonment of the old architecture by the people of the region and their fascination with modern architecture, therefore I must as one of the people of the region document and preserve that through studying, analyzing, classifying it, then inspiring typed paintings using a new technical typing that have not yet been used in the Kingd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
The Relationship of Aesthetics in the Art of Interior Architecture and Architectural Criticism
...Show More Authors

The concept of aesthetics is one of the postmodern propositions, and it is one of the branches of philosophy that examines beauty, its standards and theories, and it is a holistic concept that includes several concepts, including the beautiful, the ugly, and the sublime.
The concept of aesthetics dealt with several studies in general (and in the field of architecture in particular), and the problem of aesthetics is in the blurring of the relationship between aesthetics and architectural criticism, based on the research hypothesis which states that there is a relationship between aesthetics and architectural criticism. The importance of the research in accommodating aesthetic standards and bases of evaluation that increases the possi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (8)
Crossref (10)
Scopus Clarivate Crossref