Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Mechanism on Thermal Degradation of a Nitrate Ester Propellant
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Are obese women potential for inflammatory process? A pilot study
...Show More Authors

This study was designed to look for certain biochemical markers(serum uric acid and serum peroxynitrite) in women presented with obesity and to compare the level of these markers with non-obese women. A total number of 63 women were recruited from outpatients and private clinics to admit in this study. The patients were grouped into non obese women (Group I) and obese women (Group II). The anthropometric and blood pressure were determined and venous blood was obtained from each patient for determination of C-reactive protein, uric acid and peroxynitrite. The results showed that there were no significant differences in age or in concomitant or associated diseases in both groups except rheumatoid arthritis which account 80% of group I and 25%

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 29 2025
Journal Name
Al–bahith Al–a'alami
Evaluation in the Kurdish Media Institutions (A Descriptive Study Survey)
...Show More Authors

The importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.

Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study for Estimate Fractional Parameter of ARFIMA Model
...Show More Authors

      Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Fuzzy Logic Controller Based Vector Control of IPMSM Drives
...Show More Authors

This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Lichen planopilaris is a common scarring alopecia among Iraqi population
...Show More Authors

KE Sharquie, AA Noaimi, AF Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 11

View Publication
Publication Date
Tue Aug 26 2025
Journal Name
Biobacta Journal Of Biochemistry And Molecular Biology
How Pantoea can help solve modern agriculture problems: A Review
...Show More Authors

Modern agriculture is challenged by soil degradation, nutrient depletion, plant diseases, and excessive dependence on chemical fertilizers and pesticides. By examining different strains of Pantoea, the study highlights their role in promoting plant growth, improving their tolerance to stress, reducing reliance on synthetic agricultural inputs, and contributing to more sustainable and environmentally friendly agricultural practices. Using a combination of practical qualitative methods and reliable quantitative data, the research gathers extensive information on how these microbes impact various crops and key soil health indicators. The improvements in plant growth statistics and nutrient levels are often quite astonishing. The result

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A New Operational Matrix of Derivative for Orthonormal Bernstein Polynomial's
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref