Preferred Language
Articles
/
KxYJIYgBVTCNdQwCp3Ss
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signal-noise ratio (PSNR), mean square error (MSE) and correlation) were conducted on a group of images to determine the strength and efficiency of the proposed method, and the result proves that the proposed method provided a good level of safety. The obtained results were compared with those of other methods, and the result of comparing confirms the superiority of the proposed method.

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Hydraulic Analysis and Performance Evaluation of Combined Trunk Sewers: a Case Study of Baghdad City.
...Show More Authors

Sewer system plays an essential task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be sustainable and scientifically. For this purpose, it is crucial to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. To test this methodology; a case study of al-Rusafa in Baghdad city is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Hydraulic Analysis and Performance Evaluation of Combined Trunk Sewers: A Case Study of Baghdad City.
...Show More Authors

Sewer system plays an indispensable task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be in a sustainable and scientific manner. For this purpose, it is important to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. In order to test this methodology; a case study of al-Ru

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy Procedia
A Coupled Model of the Linear Joule Engine with Embedded Tubular Permanent Magnet Linear Alternator
...Show More Authors

Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating the Vertical Displacement using the Method of Least Squares Adjustment and 3D Objects Fitting
...Show More Authors
Abstract<p>In this research, the Iraqi flagpole at Baghdad University, which is the longest in Baghdad, with a height of 75m, was monitored. According to the importance of this structure, the calculation of the displacement (vertical deviation) in the structure was monitored using the Total Station device, where several observations were taken at different times for two years the monitoring started from November 2016 until May 2017, at a rate of four observations for one year. The observation was processed using the least square method, and the fitting of circles, and then the data was processed. The deviation was calculated using the Matlab program to calculate the values of corrections, where </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Engineering
Orbital Prosthesis Rehabilitation in Biomedical Engineering by Means of Computer Vision-Photogrammetry and 3D Prototyping
...Show More Authors

Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely

... Show More
View Publication
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
Surgical Neurology International
Enhancing neuro-ophthalmic surgical education: The role of neuroanatomy and 3D digital technologies – An overview
...Show More Authors
Background:

Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.

Methods:

A literature search across databases such as PubMed, Scopus, and W

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Al-kindy College Medical Journal
Quality of Primary Care Center Referral Letters and Feedback Reports among Sample of PHCCs in Baghdad /Al-Rusafa Health Directorate During2015
...Show More Authors

Background:The referral system constitutes a key element of health system. Effective referral system between different levels of health care delivery represents a cornerstone in addressing patients’ health needs.

Objectives:To assess the referral system Baghdad/ Al-Rusafa Health Directorate by evaluation the referral pattern and identify the quality of the referral letters and feedback reports.

Type of the study: This cross-sectional study .

Methodology : It was conducted in5PHCC in from 1st July 2015 - 31st December 2015 at Bagdad/Al-Rusafa health directorate. The study population (sampled population) included all ref

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref