Preferred Language
Articles
/
bsj-8715
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Minimizing error in robot arm based on design optimization for high stiffness to weight ratio
...Show More Authors

In this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.

A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
On the design of the annexation experience between splintered and dissociated sectors
...Show More Authors

The idea of the design of combination Between split – plot and split block means that an experiment conducted with a design

formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application   to show its idia and the ability to use it in many fields  especially in agricultural experiments field .

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of Membership Level for Critical Activities In Knowledge Chain Model Building An Investigation Analytical Study Depending on Fuzzy Logic Architecture for Organizations Pushed by Knowledge
...Show More Authors

Abstract

   The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to  knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently  in diagnosing research dimensions and measurem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Ieee Transactions On Geoscience And Remote Sensing
Echo Amplitude Normalization of Full-Waveform Airborne Laser Scanning Data Based on Robust Incidence Angle Estimation
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Fractally Generated Microstrip Bandpass Filter Designs Based on Dual-Mode Square Ring Resonator for Wireless Communication Systems
...Show More Authors

A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Electronic System Based on Cloud Computing to Develop Electronic Tasks for Students of the University of Mosul
...Show More Authors

The present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 31 2014
Journal Name
Al-khwarizmi Engineering Journal
Energy Saving of Heat Gain by Using Buried Pipe Inside a Roof
...Show More Authors

Abstract

    This work deals with a numerical investigation to evaluate the utilization of a water pipe buried inside a roof to reduce the heat gain and minimize the transmission of heat energy inside the conditioning space in summer season.     The numerical results of this paper showed that the reduction in heat gain and energy saving could be occurred with specific values of parameters, like the number of pipes per square meter, the ratio of pipe diameter to the roof thickness, and the pipe inlet water temperature. Comparing with a normal roof (without pipes), the results indicated a significant reduction in energy heat gain which is about 37.8% when the number of pipes per m

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Removal Color Study of Toluidine Blue dye from Aqueous Solution by using Photo-Fenton Oxidation
...Show More Authors

The degradation of Toluidine Blue dye in aqueous solution under UV irradiation is investigated by using photo-Fenton oxidation (UV/H2O2/Fe+). The effect of initial dye concentration, initial ferrous ion concentration, pH, initial hydrogen peroxide dosage, and irradiation time are studied. It is found put that the removal rate increases as the initial concentration of H2O2 and ferrous ion increase to optimum value ,where in we get more than 99% removal efficiency of dye at pH = 4 when the [H2O2] = 500mg / L, [Fe + 2 = 150mg / L]. Complete degradation was achieved in the relatively short time of 75 minutes. Faster decolonization is achieved at low pH, with the optimal value at pH 4 .The concentrations of degradation dye are detected by spectr

... Show More
View Publication Preview PDF
Crossref