Preferred Language
Articles
/
bsj-8715
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of higher Education Institutes in restricting Administrative and Financial Corruption: An Analytic Reading
...Show More Authors

Corruption, in all its categories and forms, is regarded as the nowadays virus which has greatly spread in most institutes and society, a matter that cause a great waste of resources.

      According to the reports of international transparency Institute, Iraq is regarded as one of the greatest countries in corruption.

      Regardless of the reasons and forms of corruption, the retreat in work – values and ethics are the main reasons behind that.

      Being the main source of providing qualified staff "educators" for the working market, the high education institutes face great challenges in standing against corruption inside and outside

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Ethical Behavior and its Relationship to Social Media Uses among Female Students at Preparatory Schools in Baghdad
...Show More Authors

The current study aims to assess the ethical behavior among female students who are using a social media network in addition to describe the variables of interest (social media use and ethical behavior) among participants, in which to find out the effects of social media on the ethical behavior of high school female students. A quantitative approach was adopted to collect the relevant data for the study, six schools included in this study from the six directorates of education in Baghdad city. Subsequently, SPSS software was applied to analyze the relevant data of the study. To achieve the research objectives, a questionnaire was composed of three sections: Part I: deals with the student's demographic information. Part II: deals with inf

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
كلية التربية الاساسية
رؤية مستقبلية للتطوير الإداري لكليات التربية في جامعة بغداد بأستخدام تكنولوجيا المعلومات والاتصالات
...Show More Authors

إن التطور الهائل في منظومة تكنولوجيا المعلومات والاتصالات في العالم , أثر كثيراً في الجوانب الحياتية والاجتماعية والاقتصادية والسياسية والثقافية عامة والتربوية والتعليمية خاصة, إذ أصبح لها دور كبير في تسيير الكثير من الأمور. ولا بد من القول ان المؤسسات والمنظمات لا يمكن ان تنتقل من القرن العشرين الى القرن الحادي والعشرين إلا إذا أفادت من تكنولوجيا المعلومات والاتصالات, إذ توافر هذه التكنولوجيا الكثير من ال

... Show More
Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Construction Engineering And Management
Measuring and Evaluating Safety Maturity of Construction Contractors: Multicriteria Decision-Making Approach
...Show More Authors

View Publication
Scopus (70)
Crossref (55)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Buildings
Reduced Volume Approach to Evaluate Biaxial Bubbled Slabs’ Resistance to Punching Shear
...Show More Authors

The bubbled slab, a type of reinforced concrete (RC) slab with plastic voids, is an innovative design that employs a biaxial distribution of voiding formers within the slab to reduce the slab’s self-weight while preserving a load-carrying capacity that is approximately comparable to that of solid slabs. This paper presents a new approach for figuring out the effective critical shear perimeter of voided slabs using the reduced-volume concept of concrete. This approach aims to reduce the coefficient of variation of the current design standards, namely the ACI 318-19 and Eurocode 2, for assessing the slabs’ resistance to punching shear. Our experimental program investigated the impact of voiding former patterns and the location of

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (27)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref