Preferred Language
Articles
/
bsj-6398
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of  five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare some wavelet estimators for parameters in the linear regression model with errors follows ARFIMA model.
...Show More Authors

The aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Parametric and Non –parametric Methods To Estimate Median Effective Dose ( ED5
...Show More Authors

            In this paper the research represents an attempt of expansion in using the parametric and non-parametric estimators to estimate the median effective dose ( ED50 ) in the quintal bioassay and comparing between  these methods . We have Chosen three estimators for Comparison. The first estimator is
( Spearman-Karber )  and the second estimator is ( Moving Average ) and The Third estimator  is ( Extreme Effective Dose ) .
We used a minimize Chi-square as a parametric method. We made a Comparison for these estimators by calculating the mean square error of (ED50) for each one of them and comparing it with the optimal the mean square

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Production of Biodiesel Fuel from Oleic Acid and Comparison of its Properties with Petroleum Diesel
...Show More Authors

Biodiesel define as the mono-alkyl esters of vegetable oil and animal fats is an alternative diesel fuel that is steadily gaining attention because the combustion of fossil fuels such as coal, oil and natural gas has been identify as a major cause of the increase in the concentration of carbon dioxide in the earth’s atmosphere and causing global warming.
The present work concerns with estimating the physical properties experimentally such as kinematic viscosity, density, flash point and carbon residue of biodiesel that produced by the esterification reaction of methanol and oleic acid with homogeneous catalysts H2SO4 in a lab-scale packed reactive distillation column using the best operating conditions of methanol to oleic acid 8:1,

... Show More
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Engineering, Technology & Applied Science Research
Experimental and Numerical Comparison of Reinforced Concrete Gable Roof Beams with Openings of Different Configurations
...Show More Authors

This paper demonstrates an experimental and numerical study aimed at comparing the influence of openings of different configurations on the flexural behavior of reinforced concrete gable roof beams. The experimental program consisted of testing six simply supported gable beams subjected to mid-point concentrated load. The variable which has been investigated in this work was opening's configuration (quadrilateral or circular) with the same upper and lower chords depth. The results indicate improvement in the beams’ flexural behavior when circular openings were used compared with that of quadrilateral openings, represented by an increase in ultimate load capacity and a decrease in deflection at the service limit. Also, there was an

... Show More
View Publication Preview PDF
Crossref (18)
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Except that of wishing between Sibawayh and grammarians
...Show More Authors

The scholars of Arabic - may God reward them with the reward of the doers of good - laid down the rules of this language, the cycle of which never ceases to dazzle minds, so they adopted principles according to which they judged the denomination of this word, and the accusative of that, and determined in its light the worker and the done, until they reached us the rules and foundations of our dear language, and it is obvious that they differ. The origins of grammarians from one school of thought to another, or from one world to another, especially with regard to the subsidiary rules, and this difference was clearly reflected in what we have received from the rules, as we find a difference in the rulings that they restricted to the one fa

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Comparison between Open Mini-incision Thyroidectomy and Conventional Thyroidectomy: Clinical Experience and Literatures Review
...Show More Authors

Background: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the oper

... Show More
View Publication Preview PDF