Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 Ieee Nuclear Science Symposium, Medical Imaging Conference And Room-temperature Semiconductor Detector Workshop (nss/mic/rtsd)
Comparison of columnar and pixelated scintillators for small field of view hybrid gamma camera imaging
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Class and its impact on society
...Show More Authors

Man has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations
...Show More Authors

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of a novel coating material on the microleakage of glass hybrid restoration in primary teeth – An in vitro study
...Show More Authors

Background: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the therm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of a novel coating material on the microleakage of glass hybrid restoration in primary teeth – An in vitro study
...Show More Authors

Background: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the

... Show More
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
الاخطاء القاتلة التي يرتكبها المدراء
...Show More Authors

تعلمنا في المدارس بأن ارتكاب الاخطاء شيء غير مقبول، وقد تهتز مكانتنا بسببها، وعندما نتخرج من معاهدنا وكلياتنا، ونحصل على شهاداتنا العلمية، وندخل عالم العمل يستمر كرهنا وامتعاظنا لها. وبناءاً على ذلك، نحاول بذل قصارى جهدنا لتحاشي الاخطاء مهما كانت بسيطة، وقد نقوم احياناً بإخفائها، او تحويل لوم وقوعها على الغير. ففي هذه الحالة، ندفع اثماناً باهضة لأخطانئا، وقد يصل الأمر الى خسارة وظائفنا لا بل حياتنا في

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref