Preferred Language
Articles
/
0xcUPo8BVTCNdQwCqWTl
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Comparison between Rush Model Parameters to Completed and Lost Data by Different Methods of Processing Missing Data
...Show More Authors

The current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Computers And Electronics In Agriculture
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

View Publication
Crossref (111)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Huazhong University Of Science And Technology [medical Sciences]
New mini dental implant attachments versus O-ring attachment after cyclic aging: Analysis of retention strength and gap space
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Apr 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis, Characterization and Study Biological Activity of Some New 1, 3, 4-Thiadiazole and Pyrazolone Derivatives Containing Indole Ring
...Show More Authors

This work involves synthesis and characterization of some new 1, 3, 4-thiadiazole or pyrazoline derivatives heterocyclic containing indole ring. The new 2-amino-1, 3, 4-thiadiazole derivatives [IV] and [V] a, b were synthesized by cyclization reaction of 2-methyl-1H-indole-carbothiosemicarbazide [III] in H2SO4 acid or by reaction of indole-3-acetic acid or indole-3-butanoic acid with thiosemicarbazide in the presence of phosphorous oxychloride, respectively. Amide derivatives [VI]-[VIII] were synthesized by the reaction equimolar of 2-amino-1, 3, 4-thiadiazoles and (acetyl chloride, benzoyl chloride, anisoyl chloride and heptanoyl chloride) in DMF and pyridine as accepter. The new pyrazolone derivatives [XI] a, b were synthesized from heati

... Show More
Publication Date
Thu Aug 01 2024
Journal Name
Fuel
Experimental influence assessments of water drive and gas breakthrough through the CO2-assisted gravity drainage process in reservoirs with strong aquifers
...Show More Authors

Mature oil reservoirs surrounded with strong edge and bottom water drive aquifers experience pressure depletion and water coning/cresting. This laboratory research investigated the effects of bottom water drive and gas breakthrough on immiscible CO2-Assisted Gravity Drainage (CO2-AGD), focusing on substantial bottom water drive. The CO2-AGD method vertically separates the injected CO2 to formulate a gas cap and Oil. Visual experimental evaluation of CO2-AGD process performance was performed using a Hele-Shaw model. Water-wet sand was used for the experiments. The gas used for injection was pure CO2, and the “oleic” phase was n-decane with a negative spreading coefficient. The aqueous phase was deionized water. To evaluate the feasibilit

... Show More
View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Fuel
Experimental evaluation of Carbon Dioxide-Assisted Gravity Drainage process (CO2-AGD) to improve oil recovery in reservoirs with strong water drive
...Show More Authors

Crossref (29)
Crossref