Preferred Language
Articles
/
bsj-8715
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 16 2020
Journal Name
The Imaging Science Journal
Single image dehazing by dark channel prior and luminance adjustment
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Improving an Ovulation Rate in Women with Polycystic Ovary Syndrome by Using Silymarin
...Show More Authors

Polycystic ovary syndrome(PCOS) is a heterogeneous disorder of uncertain etiology , it is the most common endocrinopathy in women and most common cause of anovulatery infertility ,characterized by chronic anovulation and hyperandrogenemia .The present study was designed to investigate the effect of silymarin which is known to have antioxidant and insulin sensitivity effects on the  levels of glucose, insulin ,testosterone ,leutinizing hormone(LH) and progesterone .Ovulation rate and Homeostasis Model Assessment of insulin Resistance (HOMA) ratio were determined .A 3-months of treatment were conducted in 60 PCOS patients in three well-matched groups .The first one (n=20),received silymarin(750mg/day)  .The second group received

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of technical innovation on the human resources management ambidexterity through job emededdness
...Show More Authors

 

The current research aims to validate the Effect of technical innovation on human resources management ambidexterity through job embeddedness. The current research was done in  Al-Etihad Food Industries Co. Ltd. And within the industrial environment, the research was designed according to the descriptive research. And to achieve the main goal of the research above, the researcher used the questionnaire as a key instrument to collect data through the views of a sample of managers, and employees at the senior, middle and executive management level. The research sample reached (107) individuals, the data were analysed using the statistical packages (SPSS v. 26) and ( SMART PLS v 3. 3. 8) the group of statistical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Develop design interior spaces for children's theater halls in Baghdad: إخلاص عبد سلمان
...Show More Authors

The research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Aesthetics word word Allah in Kufic script design configurations: عادل سعدي فاضل السعدي
...Show More Authors

Taken the word the word God itself the task when the Muslim calligraphers because of its holiness and majesty and altitude, so take Calligraphers innovate in their design, which represents the images and forms experiencing them prolific artistic output to highlight the aesthetic value through the use of Kufic script which is one of the most prominent lines his susceptibility diversity decorative Add the possibility of extending the letters in different directions because of the vision calligrapher aesthetic and an investigation is required for the word of the design, so the researcher examined by dividing into four chapters,Was the first research problem and the importance and goals and identify the term, while the second chapter was div

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 25 2022
Journal Name
2022 Ieee 20th International Conference On Industrial Informatics (indin)
Robust Continuous Sliding Mode Controller for Uncertain Canonical Brunovsky Systems Using Reduced Order Extended State Observer
...Show More Authors

A reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref