Preferred Language
Articles
/
ExeSh5IBVTCNdQwCdbNb
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more efficiently and productively. The results of the cipher/decipher analysis, 15 NIST test, comparison between proposal FLED and original LED based on the results of correlation coefficient (CC)and Cosine Similarity (CS), execution time, and throughputs showed that the proposed FLED has faster cipher and more productive than the original LED; it is also more secure than the original LED.

Scopus Crossref
View Publication
Publication Date
Thu Dec 01 2011
Journal Name
2011 Developments In E-systems Engineering
Enhanced Computation Time for Fast Block Matching Algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Symmetry
Fast Overlapping Block Processing Algorithm for Feature Extraction
...Show More Authors

In many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th

... Show More
View Publication
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Water Flow Visualization And Velocity Measurement Using Hydrogen Bubble Generation Technique In Low Speed Open Channel
...Show More Authors

Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Apr 30 2019
Journal Name
Journal Of Planner And Development
the effect of organizing the university environment on increasing its efficiency and directing economic resiurces
...Show More Authors

Technical education in Iraq Composed of, a complex system of technical competence and scientific, technical and administrative, which extends to cover large areas of the country and constitute a vicious circle between economic development, social and cultural rights through middle-management on the one hand, and between academic knowledge and political decision-making, which aims to bring such development On the other hand, in the light of that education is the actual technical extension applied to create the idea of complementarily between them. In Iraq, have been distributed institutes and technical colleges to achieve those goals, in addition to realizing the idea of integration between them and community, and integration of t

... Show More
View Publication
Publication Date
Tue May 07 2019
Journal Name
Acm Journal On Emerging Technologies In Computing Systems
Neuromemrisitive Architecture of HTM with On-Device Learning and Neurogenesis
...Show More Authors

Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil

... Show More
View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Effect of exercises on the VertiMax device on the endurance of under 16-years of age discus throwers
...Show More Authors

The primary aim of the present study was to prepare a set of exercises on the multi-resistor VertiMax device and to identify the effect of these exercises on the development of the endurance of discus throwers under 16 years old. The design of the present study was experimental. Participants were selected using purposive sampling method. A total of 5 discuss players constituted the sample of the study. The authors found a significant improvement in the levels of endurance and performance as a result of the training on the VertiMax device. Therefore, it is recommendable to use exercises on the VertiMax device to improve the endurance and performance of under 16-years of age discus throwers.

View Publication
Crossref