Preferred Language
Articles
/
DRcrPo8BVTCNdQwChGUG
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of Community Pharmacists Knowledge, Attitude and Practice towards Modified Release Dosage Forms
...Show More Authors

Purpose:To evaluate knowledge, practice and attitude of community pharmacists in Basra regarding modified release dosage forms which are widely used for many therapeutic purposes in pharmacy practice.

Methods:The current study was conducted among certified pharmacists in Basra governorate- south of Iraq. Data collection was carried out by a questionnaire.

Results:A total number of 175 community pharmacists responded to the questionnaire. The majority worked in OTC based dispensing pharmacies located in the center of the city. Most respondents missed K1 and were unable to state the difference between different types of modified products. There was a major positive agreemen

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 31 2013
Journal Name
Inventi Impact: Artificial Intelligence
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett

... Show More
View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Impact of Preparing HMA with Modified Asphalt Cement on Moisture and Temperature Susceptibility
...Show More Authors

Many researchers tried to prevent or reduce moisture damage and its sensitivity to temperature to improving the performance of hot mix asphalt because it is decreasing the functional and structural life of fixable pavement due to the moisture damage had exposed to it.

The main objective of this study is to inspect the effect of (fly ash “3%, 6%, 12%”, hydrated lime”5%, 10%, 20%” and silica fumes”1%, 2%, 4%) referring to previous research by the net weight asphalt cement as a modified material on the moisture and temperature sensitivity of hot mix asphalt. This was done using asphalt from AL-Nasiria refinery with penetration grade 40-50, nominal maximum size (12.5) mm (surface course) of aggregate and on

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Innovative Infrastructure Solutions
Chemical and rheological properties of reclaimed asphalt binders modified by waste engine oil
...Show More Authors

Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
Fused and Modified Evolutionary Optimization of Multiple Intelligent Systems Using ANN, SVM approaches
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Thompson –Type Testimators for the Parameters of Simple Linear Regression Model
...Show More Authors

 Dens itiad ns vcovadoay fnre Dec2isco0D,ia asrn2trcds4 fenve ns 6ocfo ts ida%n2notd, rasr sedno6t(a asrn2trcd fnre sc2a 2cynwnvtrnco co nrs wcd2 /nt sedno6t(a fan(er wtvrcd ﯿ)ﺔ mh         Dens r,ia cw asrn2trcds et/a laao vcosnyaday wcd asrn2trno( rea itdt2arads ﻘ cw sn2i%a %noatd da(dassnco 2cya%4 feao t idncd asrn2tra cw rea itdt2arad /t%ua )ﻘm ns t/tn%tl%a4 st, ﻘxh Dens ﻘx ets laao dawadday no srtrnsrnvt% %nradtrudas ts (uass icnor tlcur rea itdt2arad ﻘh         Dea aMidassncos wcd Snts4 Oato -9utday 8ddcd )O-8m toy .a%trn/a 8wwnvnaov, cw rea idcicsay asrn2trcds tda clrtnoayh 1u2adnvt% dasu%rs tda idc/nyay feao rea

... Show More
View Publication Preview PDF