Preferred Language
Articles
/
joe-1968
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 27 2024
Journal Name
International Journal Of Economic Perspectives
The impact of strategic leadership on the building of intelligent organizations: A field study of a group of economic institutions in Algeria
...Show More Authors

This study aims to highlight the role of strategic leadership in adopting the intelligent organization model. The study was conducted on 7 economic organizations in Algeria. The study population consisted of 354 leaders, of whom a random sample of 176 leaders (managers, department heads, division heads, engineers) was selected. The researcher used a questionnaire as the main tool of the study. Statistical analysis and hypothesis testing were conducted using SEM (Structural Equation Modeling) with the aid of SPSS.v26 and AMOS.v24 software. The study concluded with a set of results, most notably: there is a statistically significant direct positive effect between strategic leadership and building intelligent organizations at a significance le

... Show More
Publication Date
Tue Dec 03 2013
Journal Name
Al-kindy College Medical Journal
The Role of Tibialis Posterior Tendon Transfer in Correction of Foot Drop Deformity
...Show More Authors

Backgr ound: The transfer of the tibialis posterior tendon to the anterior aspect of the ankle not only replaces the function of the paralyzed muscles, but also removes the deforming force on the medial aspect of the foot. Objecti ves: In this study, we evaluated patients who underwent tibialis posterior tendon transfer for the treatment of foot drop, and comparison through interosseous membrane route versus anterior to lower tibia route of tibialis posterior tendon transfer, with evaluation of the results according to carayon criteria Methods: Nine patients with foot drop secondary to different causes treated with tibialis posterior tendon transfer from January 2011 to January 2012 were followed up for a mean of 12 months in Al Kindy Teach

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
The Role of Tibialis Posterior Tendon Transfer in Correction of Foot Drop Deformity
...Show More Authors

Bac kground: The transfer of the tibialis posterior tendon to the anterior aspect
of the ankle not only replaces the function of the paralyzed muscles, but also
removes the deforming force on the medial aspect of the foot.
Objec t i ves : In this study, we evaluated patients who underwent tibialis
posterior tendon transfer for the treatment of foot drop, and comparison through
interosseous membrane route versus anterior to lower tibia route of tibialis
posterior tendon transfer, with evaluation of the results according to carayon
criteria
Methods: Nine patients with foot drop secondary to different causes treated with
tibialis posterior tendon transfer from January 2011 to January 2012 were
followed up for a

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 16 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Type 2 Diabetic Patients’ Knowledge Regarding Preventive Measures of Diabetic Foot
...Show More Authors

Objective: Assess type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot. Find out the relationship between of type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot with certain sociodemographic characteristics

Methodology: A descriptive study was carried out from (2nd January 2022 to 26th March 2022).  A non –probability (purposive) sample of (60) adult patients who are diagnosed with type2 diabetes mellitus these patients have met the study criteria which was selected from Imam AL-Hussein Medical-City. The study instrument consist of two section: (Demographic Information Sheet, and Foot Care Outcome Expectation

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Determination of the Fertility of Southern Iraqi Soil Using Laser - Induced Breakdown Spectroscopy System
...Show More Authors

In this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref