Preferred Language
Articles
/
DRcrPo8BVTCNdQwChGUG
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.

Publication Date
Fri Jul 01 2022
Journal Name
Ieee Transactions On Systems, Man, And Cybernetics: Systems
Design of Robust Terminal Sliding Mode Control for Underactuated Flexible Joint Robot
...Show More Authors

Flexible joint robot (FJR) manipulators can offer many attractive features over rigid manipulators, including light weight, safe operation, and high power efficiency. However, the tracking control of the FJR is challenging due to its inherent problems, such as underactuation, coupling, nonlinearities, uncertainties, and unknown external disturbances. In this article, a terminal sliding mode control (TSMC) is proposed for the FJR system to guarantee the finite-time convergence of the systems output, and to achieve the total robustness against the lumped disturbance and estimation error. By using two coordinate transformations, the FJR dynamics is turned into a canonical form. A cascaded finite-time sliding mode observer (CFTSMO) is construct

... Show More
View Publication
Scopus (138)
Crossref (125)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Case Studies In Thermal Engineering
Robust composite temperature control of electrical tube furnaces by using disturbance observer
...Show More Authors

As one type of resistance furnace, the electrical tube furnace (ETF) typically experiences input noise, measurement noise, system uncertainties, unmodeled dynamics and external disturbances, which significantly degrade its temperature control performance. To provide precise, and robust temperature tracking performance for the ETF, a robust composite control (RCC) method is proposed in this paper. The overall RCC method consists of four elements: First, the mathematical model of the ETF system is deduced, then a state feedback control (SFC) is constructed. Third, a novel disturbance observer (DO) is designed to estimate the lumped disturbance with one observer parameter. Moreover, the stability of the closed loop system including controller

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Frontiers In Cell And Developmental Biology
Hypoxia-Modified Cancer Cell Metabolism
...Show More Authors

View Publication
Scopus (415)
Crossref (427)
Scopus Clarivate Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Inspiration Of Typed Paintings From Folk Architecture In Asir Region: مريم محمد العمري
...Show More Authors

  This research aims to realize one of the pillars of Saudi vision (2030) through searching for new sources full of material folklore that had not previously been studied, so this study will study folk motifs engraved on the doors and windows in the Bani Amru Center in the Al-Namas governorate that is situated in the Asir region , in particular the tribe (Bani Rafe), before being disappeared due to the abandonment of the old architecture by the people of the region and their fascination with modern architecture, therefore I must as one of the people of the region document and preserve that through studying, analyzing, classifying it, then inspiring typed paintings using a new technical typing that have not yet been used in the Kingd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Symbolism in Architecture and Arts of the Holy Shrines: صادق هاشم حسن الموسوي
...Show More Authors

  The current research is interested in studying the symbol, due to its significant role in the architecture and arts in the holy shrines regardless of their architecture and artistic patterns, through which the symbolic and philosophical connotations insides the holy shrines are revealed. Due to the importance of the topic of the symbol, Almighty God remarked in the holy Quran (He said, "My Lord, make for me a sign." He Said, "Your sign is that you will not [be able to] speak to the people for three days except by gesture. And remember your Lord much and exalt [Him with praise] in the evening and the morning.") (Surat Al-Imran, verse 41). The research consists of two dimensions dealing with symbol and symbolism in its linguistic an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
The Relationship of Aesthetics in the Art of Interior Architecture and Architectural Criticism
...Show More Authors

The concept of aesthetics is one of the postmodern propositions, and it is one of the branches of philosophy that examines beauty, its standards and theories, and it is a holistic concept that includes several concepts, including the beautiful, the ugly, and the sublime.
The concept of aesthetics dealt with several studies in general (and in the field of architecture in particular), and the problem of aesthetics is in the blurring of the relationship between aesthetics and architectural criticism, based on the research hypothesis which states that there is a relationship between aesthetics and architectural criticism. The importance of the research in accommodating aesthetic standards and bases of evaluation that increases the possi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Removal of Hexavalent Chromium from Aqueous Solutions by Adsorption on Thermally Modified and Non-Modified Eggshells
...Show More Authors

Removal of heavy metals from waste water has received a great deal of attention. The compare Cr
(VI) adsorption characteristics removing from wastewater by using thermally modified and non-modified
eggshells were examined

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
Tencon 2021 - 2021 Ieee Region 10 Conference (tencon)
Robust State Feedback Control of Electric Heating Furnace Using a New Disturbance Observer
...Show More Authors

As one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord

... Show More
View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref