Preferred Language
Articles
/
0xcUPo8BVTCNdQwCqWTl
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Ijid Regions
Systemic sclerosis presents its cutaneous manifestations with innovative triple therapeutic regime
...Show More Authors

Scopus
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing Assurance Services Using Non-Renewable Resources Standard (NR0401) “Constructive Materials: Applied Research for Kufa Cement Factory
...Show More Authors

The importance of this study stems from the importance of preserving the environment and creating a clean sustainable environment from waste and emissions and all the operations of industrial companies in general and cement companies in particular by activating sustainability accounting standards. The research aims to identify and diagnose deviations in violation of sustainability standards by employing the non-renewable resources standard (NR0401) For the construction industries to create a sustainable audit environment, the deductive approach was followed in the theoretical side and the inductive and descriptive approach to the practical side. The most important results of the research were the possibility of applying sustainab

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Baghdad Science Journal
Simultaneous spectrophotometric method for determination of both ciprofloxacin and cephalexin by using H-point standard addition method
...Show More Authors

طريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين  في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من  السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Optics And Applications
Modeling and Analysis of a Miniaturized Ring Modulator Using Silicon-Polymer-Metal Hybrid Plasmonic Phase Shifter. Part II: Performance Predictions
...Show More Authors

The ring modulator described in part I of this paper is designed here for two operating wavelengths 1550nm and 1310nm. For each wavelength, three structures are designed corresponding to three values of polymer slot widths (40, 50 and 60nm). The performance of these modulators are simulated using COMSOL software (version 4.3b) and the results are discussed and compared with theoretical predictions. The performance of intensity modulation/direct detection short range and long rang optical communication systems incorporating the designed modulators is simulated for 40 and 100Gb/s data rates using Optisystem software (version 12). The results reveal that an average energy per bit as low as 0.05fJ can be obtained when the 1550nm modulator is d

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Optics And Applications
Modeling and Analysis of a Miniaturized Ring Modulator Using Silicon-Polymer-Metal Hybrid Plasmonic Phase Shifter. Part I: Theoretical Framework
...Show More Authors

This paper presents comprehensive analysis and investigation for 1550nm and 1310nm ring optical modulators employing an electro-optic polymer infiltrated silicon-plasmonic hybrid phase shifter. The paper falls into two parts which introduce a theoretical modeling framework and performance assessment of these advanced modulators, respectively. In this part, analytical expressions are derived to characterize the coupling effect in the hybrid phase shifter, transmission function of the modulator, and modulator performance parameters. The results can be used as a guideline to design compact and wideband optical modulators using plasmonic technology

View Publication
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors

Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref