Preferred Language
Articles
/
GRavmYcBVTCNdQwCcVgf
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.

Crossref
View Publication
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Approximate Solutions for Nonlinear Blasius Equations
...Show More Authors

The method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Potentiometric Transducers for the Selective Recognition of Risperidone Based on Molecularly Imprinted Polymer
...Show More Authors

          Graphite Coated Electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Risperidone (Ris). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by bulk polymerization using (Ris.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Engineering Science And Technology
Applying box-behnken design with statistical optimization for removal vat orange dye from aqueous solution using kaolin
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Enhanced RC5 Key Schedule Using One-Dimensional Cellular Automata for Audio File Encryption
...Show More Authors

Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data.  In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2012
Journal Name
Al-kindy College Medical Journal
Scaphoid Fracture Non Union Treated by Bone Graft and Plaster of Paris Cast Splint.
...Show More Authors

Objective: to evaluate the results of (Modification of Russe method) in treatment of nonunion fracture scaphoid bone by bone graft with external splintage (plaster of paris cast (pop ). Methods:Prospective study done on 26 patients (24 male, 2 female), age range between 25-42 years (mean age 34 years), fracture site at middle 1/3 with minimal displacements with no carpal bone or radial bone injury, technique of Matte- Russe method (explore the bone through volar approach using bone graft from iliac crest (cortico-cancellous peg plus cancellus bone) with thumb spica for 90 days with period of follow up 12-18 months. Results: out of 26 patients treated by this method , 23 patients (88.5%) union was achieved radiologically by the end of 3rd mo

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Scaphoid Fracture Non Union Treated by Bone Graft and Plaster of Paris Cast Splint.
...Show More Authors

Objective: to evaluate the results of (Modification of Russe method) in treatment of nonunion fracture scaphoid bone by bone graft with external splintage (plaster of paris cast (pop ).
Methods:Prospective study done on 26 patients (24 male, 2 female), age range between 25-42 years (mean age 34 years), fracture site at middle 1/3 with minimal displacements with no carpal bone or radial bone injury, technique of Matte- Russe method (explore the bone through volar approach using bone graft from iliac crest (cortico-cancellous peg plus cancellus bone) with thumb spica for 90 days with period of follow up 12-18 months.
Results: out of 26 patients treated by this method , 23 patients (88.5%) union was achieved radiologically by the end

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On S*g--Open Sets In Topological Spaces
...Show More Authors

  In this paper, we introduce a new class of sets, namely , s*g--open sets and we show that the family of all s*g--open subsets of a topological space ) ,X(  from a topology on X which is finer than  . Also , we study the characterizations and basic properties of s*g-open sets and s*g--closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g-  -continuous functions and s*g-  -irresolute functions in topological spaces . Some properties of these functions have been studied .

View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
The Operator S(a,b;θ_x ) for the Polynomials Z_n (x,y,a,b;q)
...Show More Authors

In this work, we give an identity that leads to establishing the operator . Also, we introduce the polynomials . In addition, we provide Operator proof for the generating function with its extension and the Rogers formula for . The generating function with its extension and the Rogers formula for the bivariate Rogers-Szegö polynomials  are deduced. The Rogers formula for  allows to obtain the inverse linearization formula for , which allows to deduce the inverse linearization formula for . A solution to a q-difference equation is introduced and the solution is expressed in terms of the operators . The q-difference method is used to recover an identity of the operator  and the generating function for the polynomials

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref