Preferred Language
Articles
/
BRcoPo8BVTCNdQwCamXJ
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations. This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm. The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2. Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard. This means the Differential cryptanalysis cannot be performed on the cipher-text.

Publication Date
Thu Nov 18 2021
Journal Name
Iraqi Journal Of Physics
The study of nuclear structure for some nuclei
...Show More Authors

An analytical form of the ground state charge density distributions
for the low mass fp shell nuclei ( 40  A  56 ) is derived from a
simple method based on the use of the single particle wave functions
of the harmonic oscillator potential and the occupation numbers of
the states, which are determined from the comparison between theory
and experiment.
For investigating the inelastic longitudinal electron scattering form
factors, an expression for the transition charge density is studied
where the deformation in nuclear collective modes is taken into
consideration besides the shell model space transition density. The
core polarization transition density is evaluated by adopting the
shape of Tassie mod

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Implementation of EEG-Based Smart Structure
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 15 2004
Journal Name
Sciences Journal Of Physical Education
Setting standard levels for some offensive skill abilities according to basketball playing positions
...Show More Authors

لا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المستويات المعيارية ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية، ومما شكل ذلك ضع

... Show More
Preview PDF
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Minimal sternotomy surgery in comparison to standard sternotomy in the coronary bypass Surgery
...Show More Authors

Background Median sternotomy is the gold standard incision for most cardiac operations. However, with the advent of minimal invasive surgery, a new approach emerged in cardiac surgery named mini-sternotomy and has been successfully used to perform a variety of operations.

 The aim of this paper is to present our experience of using mini-sternotomy to harvest the left internal mammary artery (LIMA) for off-pump revascularization of the left anterior descending artery (LAD)

 Methodology Over a 2-year period (October 2012-October 2014), 100 patients underwent coronary artery bypass grafting (CABG) via conventional median sternotomy (CMS) (n=80) and mini-sternotomy (MS) (n=20). The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 28 2025
Journal Name
Journal Of Physical Education
Standard scores and levels for certain legal situations among first-class basketball referees
...Show More Authors

The significance of the research lies in the fact that electronic technologies represent an important step in evaluating legal situations, and the research problem centered on the lack of attention to visual requirements and the absence of a clear image of legal situations that may be difficult for the referee to apply correctly in addition to the lack of focus on visual requirements and the unclear depiction of some legal cases which make it difficult for the referee to interpret them correctly This is because the referee's main tool is visual perception, which interprets live situations such as violations, fouls, and other cases that arise during a game Moreover, there are numerous responses and challenges in evaluating legal situ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Low Cost Hardware Back Propagation Algorithm
...Show More Authors

The first successful implementation of Artificial Neural Networks (ANNs) was published a little over a decade ago. It is time to review the progress that has been made in this research area. This paper provides taxonomy for classifying Field Programmable Gate Arrays (FPGAs) implementation of ANNs. Different implementation techniques and design issues are discussed, such as obtaining a suitable activation function and numerical truncation technique trade-off, the improvement of the learning algorithm to reduce the cost of neuron and in result the total cost and the total speed of the complete ANN. Finally, the implementation of a complete very fast circuit for the pattern of English Digit Numbers NN has four layers of 70 nodes (neurons) o

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Low Cost Hardware Back Propagation Algorithm
...Show More Authors

The first successful implementation of Artificial Neural Networks (ANNs) was published a little over a decade ago. It is time to review the progress that has been made in this research area. This paper provides taxonomy for classifying Field Programmable Gate Arrays (FPGAs) implementation of ANNs. Different implementation techniques and design issues are discussed, such as obtaining a suitable activation function and numerical truncation technique trade-off, the improvement of the learning algorithm to reduce the cost of neuron and in result the total cost and the total speed of the complete ANN. Finally, the implementation of a complete very fast circuit for the pattern of English Digit Numbers NN has four layers of 70 nodes (neurons) o

... Show More
View Publication Preview PDF