Preferred Language
Articles
/
DRcrPo8BVTCNdQwChGUG
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm by combining it with two other efficient encryption algorithms Number Theory Research Unit (NTRU), and Improved Hill Cipher (IHC). This aim achieved by using Advanced Encryption Standard (AES) followed by improved Hill Cipher (IHC) algorithm to encrypt and decrypt text in addition to use Number Theory Research Unit (NTRU) for the encryption and decryption of the AES key. The obtained results of this research have sufficient resistance to the brute-force attacks, and that makes this system more effective. Also, these modifications of AES architecture result in enhancing the complexity degree, increasing the search space of the key, and making the cipher-message too difficult to crack by attackers.

Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Intelligent Automation & Soft Computing‏
Modify Multi-Connect Architecture (MMCA) associative memory‏
...Show More Authors

Modify Multi-Connect Architecture (MMCA) associative memory‏

Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Facters affected trends of Contemporary Mosques Architecture
...Show More Authors

Recently new trends of mosques’ architecture have appeared. These trends differed from those of traditional ones in charictaristics which include two and three dimentional level. The traditional mosques' architecture are affected by several factors, so the research problem is (lack of knoweledge about factors forming traditional mosques' architecture and its effect on contemporary trends of mosques' architecture).The hypotheses of research is (the functional, aesthetic and symbolic religious factors of style are the most active factors in forming contemporary trends of mosques' architecture than religious and environmental factor).The research conclusion is that the symbolic functional factor is most effective factor i

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 06 2021
Journal Name
Journal Of Planner And Development
Sustainable architecture and rural housing in Iraq
...Show More Authors

Old Iraq includes the first experiences in establishing the first residential settlements in the Mesopotamian, and model villages designed and the pulp units in it and their natural matter, that made it perennial, and construction continues until now with it. These experiences were the basis for the emergence of the Iraqi civilization and thus the world and the beginning of writing, trade and the religions of the divine since before history, and then the Sumerian, Babylonian and Assyrian civilizations, and their villages that formed the Fertile Crescent.

There is a lack of knowledge and disregard for the distant and near history of Iraq in the field of rural housing, despite Iraq's leadership in this field, with the aim of the re

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Neuromorphic Architecture for the Hierarchical Temporal Memory
...Show More Authors

View Publication
Scopus (23)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Signal Processing Techniques for Robust Spectrum Sensing
...Show More Authors

Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2009
Journal Name
مجلة العلوم الاحصائية
Robust Estimator for Semiparametric Generalized Additive Model
...Show More Authors

Generalized Additive Model has been considered as a multivariate smoother that appeared recently in Nonparametric Regression Analysis. Thus, this research is devoted to study the mixed situation, i.e. for the phenomena that changes its behaviour from linear (with known functional form) represented in parametric part, to nonlinear (with unknown functional form: here, smoothing spline) represented in nonparametric part of the model. Furthermore, we propose robust semiparametric GAM estimator, which compared with two other existed techniques.

View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
An Overview of Robust Video Watermarking Techniques
...Show More Authors

     Copyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Robust and Efficient Dynamic Stream Cipher Cryptosystem
...Show More Authors

In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.

We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.

View Publication Preview PDF