Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Requirements of talent management in high- containment organizations/ field study in Technology and Science Ministry
...Show More Authors

Human resources constitute the most important recourses that the organization owned today, as it may have developed financial and technology resources to achieve their goals, but they are not able to use it with required efficiency and effective and quality desired unless there is human resources that have good skills, experiences and talents that able to directing and exploited ideally that compatible  with market requirements, where today's market and business organizations which compete naturally inherent talent, so the task is to attracting and developing talented resources and preservation these talented resources from the challenges that facing organizations. 

The research seek to achieve

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Empathy of University Students with Gender and Specialization Variables
...Show More Authors

Abstract

This study aims to identify the empathy of University Students, as well as the significant differences in sympathy in terms of gender and specialization. To achieve the aims of the study, a scale of empathy was administered to a sample of (450) students collected randomly from Baghdad university. The results showed that the study sample has a level of empathy. There is a significant difference between males and females in empathy, in favor of the female students. There is no significant difference in empathy in terms of specialization (scientific, humanities), and the interaction between males and females. The study came out with a number of recommendations and suggestions. 

View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Dialectical perspective and treatment in poetry of Khalil Hawi
...Show More Authors

Were not experience Khalil Hawi capillary module as presented or routine in the format
of the implications , but was saturated transitions quality that targeted built by visionary and
mechanisms expressive , Valgosaidp when the container is a clash between two worlds world
Nahdi to promote world on the ashes , and often strained poet himself to achieve an approach
between worlds , and in the midst of those caesarean section exhausted poet in touch his tools
and visions , and this is why the poetry Hawi toward westernization expressive as a result of
the conflict concepts chronic , be sure to researcher not engaged in the overall qualitative
changes in the structure and content, but the goal Acetknah level that qualit

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
College Of Islamic Sciences
Profiles of indignation and indiscretion in pre-Islamic poetry
...Show More Authors

Profiles of indignation and indiscretion in pre-Islamic poetry

View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Natural gas in Iraq between burning and licensing rounds
...Show More Authors

The research aims to shed light on the importance of Natural gas as a National wealth is not being used optimally to be a financial resource is important to Iraq in addition to Oil, as well as could be used as an important Source of Energy, instead of burning gas is a waste of wealth and Contribute to the contamination of the environment. Research Reviews the importance of Natural gas, where is currently about a quarter of global energy consumption. Then deals with the reality of the gas industry in Iraq and winning because of the volume of waste incineration, which reached a rate (45%) of the gas Associated with oil, where Iraq is fourth globally in Terms of the amount of gas Burned. Finally, this paper discusses the future of n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 28 2003
Journal Name
Journal Of Engineering
STABILITY OF UNREINFORCED AND REINFORCED EMBANKMENTS ON SOFT SOILS
...Show More Authors

Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determining Optimum Oil Separator Size and Optimum Operating Pressure
...Show More Authors

The optimum separators operating pressure is determined by using flash calculations and equilibrium ratios. In this study, the optimum separator size for Jambur field is calculated by using equations introduced by Arnold and Stewart and API12J Specification [1]. Because Jambur field has a high production rate two conditions are taken in the study to determine separator size, first based on production rate 80,000 bbl/day and second based on split the production between two banks A and B (40,000 bbl/day for each bank). The calculation resulted in optimum separator pressure for the first stage of 700 psi, and the second stage of 300 psi, and the third stage of 120 psi. The results show that as the number of stages increased above three

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Obesity, Glycemic and Hormonal Criteria Of Polycystic Ovary Syndrome
...Show More Authors

Background: Polycystic ovary syndrome (PCOS) is the most common endocrinopathy affecting women, at reproductive age. PCOS is a chronic hyperandrogenic state that has many significant short-term and long-term implications for patients such as oligomenorrhea, amenorrhea, infertility, diabetes mellitus, cardiovascular disease, increased risk of endometrial cancer, and hirsutism. Objectives: To evaluate the obesity and glycemic criteria among women with polycystic ovary syndrome. Method: A case control designed study was carried out at the National Diabetes Center (NDC) / Al-Mustansiryia University; on 50 participants formed the PCOS group and 50 healthy control participants. Data collected about age, age at menarche and BMI. Also, blood sam

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Wed Mar 01 2017
Journal Name
Ieee Transactions On Cognitive Communications And Networking
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref