Preferred Language
Articles
/
-oaET4YBIXToZYALG4E-
Developing a lightweight cryptographic algorithm based on DNA computing

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of the present algorithm is simple, and the running operations required small execution time for encryption-decryption sensing data. Hence, a developed algorithm called DPRESENT was introduced to improve the complexity of the cipher text based on the PRESENT algorithm and DNA cryptography technique for developing a lightweight cipher algorithm. The NIST suite showed that the proposed algorithm tests presented high level of randomness and complexity. The execution time for the proposed algorithm was kept minimal as the current cipher algorithm. The developed algorithm is a new trend that can be applied for different lightweight cryptosystems to achieve the trade-off among complexity and speed as a robust cipher algorithm.

Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Efficient Hybrid DCT-Wiener Algorithm Based Deep Learning Approach For Semantic Shape Segmentation

    Semantic segmentation is effective in numerous object classification tasks such as autonomous vehicles and scene understanding. With the advent in the deep learning domain, lots of efforts are seen in applying deep learning algorithms for semantic segmentation. Most of the algorithms gain the required accuracy while compromising on their storage and computational requirements. The work showcases the implementation of Convolutional Neural Network (CNN) using Discrete Cosine Transform (DCT), where DCT exhibit exceptional energy compaction properties. The proposed Adaptive Weight Wiener Filter (AWWF) rearranges the DCT coefficients by truncating the high frequency coefficients. AWWF-DCT model reinstate the convolutional l

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
A Review on Face Detection Based on Convolution Neural Network Techniques

     Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method. 

Scopus (6)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2009
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A New Method for DNA Isolation from Bone Marrow & Sperms of White Mice

Background: A quick and easy method was developed for extraction of DNA of eukaryotes from different samples, which are bone marrow and sperms in white mice Mus musculus strain (Balb/c).
Patients and Methods: this method using high salt buffer, Ethylene diemine tetracetec acid (EDTA), Trypsine,Sodium Dodecyl Sulfate(SDS), and urea without using Proteinase-K digestion or ultracentrifugation.
Results: This method was successful in extracting DNA from different samples in eukaryotic and this DNA is suitable for Hind III digestion.
Conclusion: Without further clean-up, the extracted DNA can be used for restriction endonuclease digestion or for numerous applications.

View Publication Preview PDF
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Scopus (18)
Crossref (17)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Glaucoma Diagnosis Based on Retinal Fundus Image: A Review

    Glaucoma is one of the most dangerous eye diseases. It occurs as a result of an imbalance in the drainage and flow of the retinal fluid. Consequently, intraocular pressure is generated, which is a significant risk factor for glaucoma. Intraocular pressure causes progressive damage to the optic nerve head, thus leading to vision loss in the advanced stages. Glaucoma does not give any signs of disease in the early stages, so it is called "the Silent Thief of Sight". Therefore, early diagnosis and treatment of retinal eye disease is extremely important to prevent vision loss. Many articles aim to analyze fundus retinal images and diagnose glaucoma. This review can be used as a guideline to help diagnose glaucoma. It presents 63 artic

... Show More
Scopus (5)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
North American Journal Of Medical Sciences
Urinary tract infections caused by staphylococcus aureus DNA in comparison to the candida albicans DNA

Background: Bacterial DNA released upon bacterial autolysis or killed by antibiotics, hence, many inflammatogenic reactions will be established leading to serious tissue damage. Aim: the present work aimed to elucidate the histopathological changes caused by prokaryotic (bacterial) DNA and eukaryotic (candidal) DNA. Materials and methods: twenty one Staphylococcus aureus and 36 Candida albicans isolates were isolated from UTI patients. Viable cells and DNA of the highest antibiotic sensitive isolates were injected, intraurethraly, in mice. Results were evaluated via histopathological examination. Results: Mildest reactions were obtained from mice challenged with viable C. albicans compared with those challenged with viable S. aureus. Dos

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication