Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
مجلة المستنصرية للعلوم والتربية
Calculation of Electron Drift Velocity in Xenon Gas Using Boltzmann Equation Analysis
...Show More Authors

Publication Date
Fri Nov 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical study of CD34 in tooth eruption by using amniotic stem cells
...Show More Authors

Background: Tooth eruption is a more general process, however, which includes certain posteruptive tooth movements. There are two fundamental requirements for both tooth eruption to occur: (1) Require soft tissue, intervening between tooth structure and alveolar bone, which plays an important role in regulating the remodeling of adjacent tissues. (2) Require bone turnover that is temporally and spatially regulated to facilitate specific translocations of teeth through alveolar bone These amniotic stem cells are multipotent and able to differentiate into various tissues, which may be useful for human application and recently it used in many medical branches. CD34 is an endothelial marker that is extensively used in immunohistochemistry a

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
World Congress On Civil, Structural, And Environmental Engineering
Improving the Behavior of Steel Plate Shear Wall Using Double Infill Plates
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Wave Propagation in Detection of Aorta Dieses Using Lumps Analysis
...Show More Authors

In this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement.  The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Using Water Quality Index to Assess Drinking Water For AL-Muthana Project
...Show More Authors

The water quality index is the most common mathematical way of monitoring water characteristics due to the reasons for the water parameters to identify the type of water and the validity of its use, whether for drinking, agricultural, or industrial purposes. The water arithmetic indicator method was used to evaluate the drinking water of the Al-Muthana project, where the design capacity was (40000) m3/day, and it consists of traditional units used to treat raw water. Based on the water parameters (Turb, TDS, TH, SO4, NO2, NO3, Cl, Mg, and Ca), the evaluation results were that the quality of drinking water is within the second category of the requirements of the WHO (86.658%) and the first category of the standard has not been met du

... Show More
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Telescope Mirror Cleaning Using Atmospheric Pressure Multi-Channel Radio Frequency Plasma Jet
...Show More Authors

     In this work, the surface of the telescope’s mirror is cleaned using an atmospheric-pressure radio frequency plasma jet (APRFPJ), which is generated by Argon gas between two coaxial metal electrodes. The RF power supply is set to 2 MHz frequencies with three different power levels: 20, 50, and 80 W. Carbon, that has adhered to the surface, can be effectively removed using the plasma cleaning technique, which also modifies any residual bonds. The cleaned surface was clearly distinguished using an optical emission spectroscopy (OES) technique and a water contact angle (WCA) analyzer for the activation property on their surfaces. The sample showed a super hydrophilic surface at an angle of 1° after 2.5 minutes of plasma tre

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Corrosion Inhibition of Low Carbon Steel in Sulfuric Acid Using Polyvinyl Alcohol
...Show More Authors

The inhibitive power of Polyvinyl Alcohol (PVA) was investigated toward the corrosion of carbon steel in 0.2N H2SO4 solution in the temperature range of 30-60˚C and PVA concentration range of 150-2000 ppm.

   The corrosion rate was measured using both the weight loss and the electrochemical techniques. The weight loss results showed that PVA could serve as a corrosion inhibitor but its inhibition power was found to be low for the corrosion of carbon steel in the acidic media. Electrochemical analysis of the corrosion process of carbon steel in an electrochemical corrosion cell was investigated using 3-Electrode corrosion cell. Polarization technique was used for carbon steel corrosion in 0.2N H

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 28 2025
Journal Name
Tikrit Journal Of Pure Science
Spectrophotometric Determination of Aluminum Using Alizarin Red S-Application to Pharmaceutical Preparations
...Show More Authors

View Publication
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction (pp.52-61)
Simulation of Residual Chlorine in Al-Yarmouk Drinking Water System Using WaterGEMS
...Show More Authors

Abstract To ensure that the distribution system has safe drinking water. It is necessary to know the residual chlorine concentrations at various points in the network. A chlorine photometer device was used to measure twenty points taken every day for a week at a selected time in the distribution system. Both pressures and flows in the network were measured using bourdon gauge and Tuf-2000H Handheld Digital ultrasonic flow meters. WaterGEMS CONNECT Edition update one software was used to simulate the flow in the network. The Baghdad water department provided the data about the network, such as the lengths of pipes, the layout of the network, and pipes diameters. The network calibrated consists of 781 pipes of different lengths and 542 juncti

... Show More
Crossref