Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Design Criteria of an Activated Carbon Bed for Dechlorination of Water
...Show More Authors

Granular carbon can be used after conventional filtration of suspended matter or, as a combination of filtration - adsorption medium. The choice of equipment depends on the severity of the organic removal problem, the availability of existing equipment, and the desired improvement of adsorption condition.
Design calculations on dechlorination by granular - carbon filters considering the effects of flow rate, pH , contact time, head loss and bed expansion in backwashing , particle size, and physical characteristics were considered assuming the absence of bacteria or any organic interface .

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
An analytical study of soil temperature with respect to its salinity
...Show More Authors

Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Radiation Effects And Defects In Solids
An automated autocorrelator for the measurement of high-frequency femtosecond pulses
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetics Contents of Data Visualization as an Input to its humanization
...Show More Authors

The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Effective Hybrid Deep Neural Network for Arabic Fake News Detection
...Show More Authors

Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (17)
Scopus Crossref
Publication Date
Tue Jun 18 2024
Journal Name
2024 Ieee 33rd International Symposium On Industrial Electronics (isie)
An Adaptive Integral Sliding Mode Control for Disturbed Servo Motor Systems
...Show More Authors

Abstract-Servo motors are important parts of industry automation due to their several advantages such as cost and energy efficiency, simple design, and flexibility. However, the position control of the servo motor is a difficult task because of different factors of external disturbances, nonlinearities, and uncertainties. To tackle these challenges, an adaptive integral sliding mode control (AISMC) is proposed, in which a novel bidirectional adaptive law is constructed to reduce the control chattering. The proposed control has three steps to be designed. Firstly, a full-order integral sliding manifold is designed to improve the servo motor position tracking performance, in which the reaching phase is eliminated to achieve the invariance of

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effect of Corporate Goverment in Tax Planning: An Empirical Study
...Show More Authors

The purpose of this study is discuss the effect of Corporate Governance in the Tax Planning, has been made in a sample of Iraqi Industrial contribution Companies listed in Iraqi Stock Exchange Market (ISE) , for the period from 2008 to 2012.The study used the" Experimental Research Approach" . Also used the (Modified Jones Model, 1995) in order to measure the corporate governance, to measure the extent of the practice of corporate governance in the samples companies. While it use to measure tax planning, the model that used by studies and researches of tax that adopted in discussions of tax reform, by analyzing the financial statements of companies  to reach  a measurement  for  the two variables of the study.  T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
"An analytical study of The New Urbanism in the urban suburbs
...Show More Authors

                 The research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the investments Iraqi fund External Development /an applied study
...Show More Authors

The research aims to evaluate Evaluation of the investments Iraqi fund for External development through the application of financial tools to a number of companies of the Iraqi Fund for External Development, and from the point of view to achieve the best returns from investment and the feasibility of the investments of the Iraqi Fund for External Development and the research community represents the Iraqi Fund for External Development and the amount of (28) A company, while the research sample is (4) companies (the Arab Petroleum Transportation Services Company, the Arab Iraqi Company for Livestock Development, the Bauhaus Company for prefabricated buildings and mineral installations, the Arab Fisheries Company) that were chosen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref