Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 12 2022
Journal Name
Axioms
Razy: A String Matching Algorithm for Automatic Analysis of Pathological Reports
...Show More Authors

Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study of the Furocoumarin Derivative of Ruta Chalepensis L. (Rutaceae)
...Show More Authors

  The content of Furocoumarin derivatives (Psoralens) of Ruta Chalepensis L. (Whole plant) was studied by simple extraction with petroleum ether (b.p. 60-80Co). The results indicated that the plant contains a total of about (0.015%).

       Investigation of these compounds by thin layer chromatography (TLC) revealed the presence of at least four compounds of which methoxsalen (8-methoxypsoralen) was isolated.     It was identified and authenticated with a standard by spectral method, IR, NMR, Mass spectra and HPLC.This plant could be considered as a good source for supplying this compound, which is widely used in dermatological preparations.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Vitamin D Levels in a Sample of Iraqi Female Patients
...Show More Authors

Background: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosa diseases characterized by recurrent, shallow, round or oval painful oral ulcers surrounded by inflammatory erythematous halos, the condition is chronic and self-limiting in immunocompetent patients. Aim of the study: to investigate the serum vitamin D levels in Iraqi female patients with RAS and the relationship between vitamin D levels and the severity of RAS. In this cross sectional study 30 female patients with idiopathic RAS, and 30 age and sex matched healthy controls were included, the severity of RAS is assessed by the number of oral aphthous ulcers in each attack and the frequency of attacks. Serum 25(OH) D levels were determined by the Enzy

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
A review of ultra-high temperature materials for thermal protection system
...Show More Authors
Abstract<p>Ultra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process o</p> ... Show More
View Publication
Scopus (60)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Mon Feb 10 2025
Journal Name
International Linguistics Research
A Semiotic Study of Reduplicative Words in Selected American Slang Expressions
...Show More Authors

This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav

... Show More
View Publication
Crossref
Publication Date
Tue Jun 09 2015
Journal Name
Arab World English Journal (awej)
Investigating Socio-pragmatic Failure in Cross-cultural Translation: A Theoretical Perspective
...Show More Authors

Pragmatics of translation is mainly concerned with how social contexts have their own influence on both the source text (ST) initiator's linguistic choices and the translator's interpretation of the meanings intended in the target text (TT). In translation, socio-pragmatic failure(SPF), as part of cross-cultural failure, generally refers to a translator's misuse or misunderstanding of the social conditions placed on language in use. In addition, this paper aims to illustrate the importance of SPF in cross-cultural translation via identifying that such kind of failure most likely leads to cross-cultural communication breakdown. Besides, this paper attempts to answer the question of whether translators from English into Arabic or vice versa h

... Show More
View Publication
Publication Date
Sat Nov 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the esthetic smile in a sample of Iraqi population
...Show More Authors

Background: The aim of the present study is to evaluate the esthetic smile in sample of Iraqi adults and to assess the gender differences. Materials and Methods: 100 persons (50malesand 50 females had class I normal dental and skeletal selected for this study.Clinical examination and digital photograph with posed smile were performed for each individual. Six linear soft tissue parameters in each photograph using AutoCAD program 2011. Five visual and four quantitative evaluations of the smile were studied for eachsubject. The smile arch and index, buccal corridor spaces (BCSs) were studied.Descriptive statistics of the measurements were calculated. Independent student’s ttestswere used to evaluate the gender differences. Statistics: Desc

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Computers &amp; Electrical Engineering
A new proposed statistical feature extraction method in speech emotion recognition
...Show More Authors

View Publication
Scopus (42)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF