Preferred Language
Articles
/
bsj-8715
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Engineering And Sustainable Development
Improving Performance Classification in Wireless Body Area Sensor Networks Based on Machine Learning Techniques
...Show More Authors

Wireless Body Area Sensor Networks (WBASNs) have garnered significant attention due to the implementation of self-automaton and modern technologies. Within the healthcare WBASN, certain sensed data hold greater significance than others in light of their critical aspect. Such vital data must be given within a specified time frame. Data loss and delay could not be tolerated in such types of systems. Intelligent algorithms are distinguished by their superior ability to interact with various data systems. Machine learning methods can analyze the gathered data and uncover previously unknown patterns and information. These approaches can also diagnose and notify critical conditions in patients under monitoring. This study implements two s

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (42)
Crossref (24)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (26)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Intellectual Capital And Its Revenues On The Investment Applied Research On Sample of Banks Listed on In The Iraq Stocks Exchange
...Show More Authors

Abstract

      The changes that happened in the environment of  business have great effects upon organizations with different activities specially the banks  which requires the existence of an able opinion  resources can adapt with the changes . Accordingly importance put upon  intellectual  capital which become one of the basic resources for organizations and one of success and growth elements with the availability of expertise , skills and capability of making  essential changes in different process due to the presentation of innovations and creations of the to support banks activities .Therefore the intellectual  capital represents the more r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
A Study on the Removal of Direct Blue 71 Dye From Textile Wastewater Produced From State Company of Cotton Industries by Electrocoagulation Using Aluminum Electrodes
...Show More Authors

The removal of direct blue 71 dye from a prepared wastewater was studied employing batch electrocoagulation (EC) cell. The electrodes of aluminum were used. The influence of process variables which include initial pH (2.0-12.0), wastewater conductivity (0.8 -12.57) mS/cm , initial dye concentration (30 -210) mg/L, electrolysis time  (3-12) min, current density (10-50) mA/cm2   were studied in order to maximize the color removal from wastewater. Experimental results showed that the color removal yield increases with increasing pH until pH 6.0 after that it decreased with increasing pH. The color removal increased with increasing current density, wastewater conductivity, electrolysis time, and decreased with increasing the concen

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 29 2015
Journal Name
Separation Science And Technology
An acidic injection well technique for enhancement of the removal of copper from contaminated soil by electrokinetic remediation process
...Show More Authors

Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Free Convection in an Inclined Concentric Annular Square Cavities Filled With Porous Medium and Heated By Non-Uniform Temperature
...Show More Authors

A numerical study of the two-dimensional steady free convection flow in an inclined annulus between two concentric square cavities filled with a porous medium is presented in this paper for the case when the side outer walls are kept with differentially heated temperature while the horizontal outer walls and the inner walls are insulated. The heated wall is assumed to have spatial sinusoidal temperature variation about a constant mean value. The Darcy model is used and the fluid is assumed to be a standard Boussinesq fluid. For the Cartesian coordinate system, the governing equations which were used in stream function form are discretized by using the finite difference method with successive under – relaxation method (SUR) and are solv

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Correction of Spherical Aberration of an Immersion Lens Operating Under Space Charge Effect Described by a 2nd Order Equation
...Show More Authors

The present work represents a theoretical study for the correction of spherical aberration of an immersion lens of axial symmetry operating under the effect of space charge, represented by a second order function and preassigned magnification conditions in a focusing of high current ion beams. The space charge depends strongly on the value of the ionic beam current which is found to be very effective and represents an important factor effecting the value of spherical aberration .The distribution of the space charge was measured from knowing it's density .It is effect on the trajectory of the ion beam was studied. To obtain the trajectories of the charged particles which satisfy the preassined potential the axial electrostatic potential w

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF