Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Ipri Journal
Hybrid regimes: An Overview
...Show More Authors

According to different types of democracy Indexes, hybrid regimes or those in the gray zone, make up the majority of regime transformations in the third wave of democracy. However, after nearly three decades, conceptual confusion about hybrid regimes persists and grows, while obstructing the accumulation of knowledge about the nature of hybrid regimes. This leads to significant political repercussions for democratization. This Paper attempts to provide a clearer view of different and overlapping concepts and classifications in this complex field, and sustain development in literature on democratic transformation. To achieve this, we followed an approach based on the classification of concepts and terms in three distinct categories, b

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
The Suggested Reciprocal Relationship between Maximum, Minimum and Optimum Usable Frequency Parameters Over Iraqi Zone
...Show More Authors

In this work, the relationship between the ionospheric parameters (Maximum Usable Frequency (MUF), Lowest Usable Frequency (LUF) and Optimum working Frequency (OWF)) has been studied for the ionosphere layer over the Iraqi zone. The capital Baghdad (44.42oE, 33.32oN) has been selected to represent the transmitter station and many other cities that spread over Iraqi region have represented as receiver stations. The REC533 communication model considered as one of the modern radio broadcasting version of ITU has been used to calculate the LUF parameter, while the MUF and OWF ionospheric parameters have been generated using ASAPS international communication model which represents one of the most advanced  and

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Physical Education
The Effect of Proposed Exercises Using Sponge Mat On the Level of Performing Offensive Skills in Sitting Volleyball
...Show More Authors

View Publication
Publication Date
Mon Nov 19 2018
Journal Name
Al–bahith Al–a'alami
A Proposed Vision for Editing News Forms
...Show More Authors

This research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 06 2010
Journal Name
Journal Of Engineering
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS
...Show More Authors

Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
proposed rules in the eastern musical theories.
...Show More Authors

This paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her impor

... Show More
View Publication Preview PDF
Crossref