Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Cultural Diversity in Native and Non-Native Speakers of English Communication
...Show More Authors

With the advancement of technology ,the study of  cross-cultural communication via on line  has become  an important and researchable topic in linguistic theory and its applications.The  aims of  this study are two- fold (a)  exploring the influence of cultural diversity on on-line interaction between American  native  speakers (NSs) and  Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls  "pragmatic failure" (PF), a main cause of communication breakdowns  and (b) specifying  which  type of PF  occurs more frequently between the two groups along with the reasons behind such failures. To achie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 10 2018
Journal Name
Iraqi Journal Of Physics
Thermal conductivity and diffusion coefficient of polymer blend 80%EP/20%UPE reinforced with sand particles
...Show More Authors

New polymer blend with enhanced properties was prepared from (80 %) epoxy resin (Ep), (20%) unsaturated polyester resin (UPE) as a matrix material. The as-obtained polymer blend was further reinforced by adding Sand particles of particle size (53 μm) with various weight fraction (5, 10, 15, 20 %). Thermal conductivity and sorption measurements are performed in order to determine diffusion coefficient in different chemical solutions (NaOH, HCl) with concentration (0.3N) after immersion for specific period of time (30 days). The obtained results demonstrate that the addition of sand powder to (80%EP/20%UPE) blend leads to an increase of thermal conductivity, with an optimum/minimum diffusion coefficient in (HCl)/(NaOH), respectively.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Sep 12 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The influence of fear on the dynamic of an eco-epidemiological system with predator subject to the weak Allee effect and harvesting
...Show More Authors

In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t

... Show More
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 12 2021
Journal Name
2021 International Conference On Electrical, Communication, And Computer Engineering (icecce)
Efficient Private Cloud Resources Platform
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Pure And Applied Mathematics Journal
Memory Effects in Diffusion Like Equation Via Haar Wavelets
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Bayesian and Non - Bayesian Inference for Shape Parameter and Reliability Function of Basic Gompertz Distribution
...Show More Authors

In this paper, some estimators of the unknown shape parameter and reliability function  of Basic Gompertz distribution (BGD) have been obtained, such as MLE, UMVUE, and MINMSE, in addition to estimating Bayesian estimators under Scale invariant squared error loss function assuming informative prior represented by Gamma distribution and non-informative prior by using Jefferys prior. Using Monte Carlo simulation method, these estimators of the shape parameter and R(t), have been compared based on mean squared errors and integrated mean squared, respectively

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Competitive Study Using UV and Ozone with H2O2 in Treatment of Oily Wastewater
...Show More Authors

          In this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref