Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 27 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Clinical Assessment and Cytomorphometric Analysis of Buccal Mucosal Cells in Behçet’s Disease Patients
...Show More Authors

Background: Behçet’s disease (BD) is a disorder of systemic inflammatory condition. Its important features are represented by recurrent oral, genital ulcerations and eye lesions. Aims. The purpose of the current study was to evaluate and compare cytological changes using morphometric analysis of the exfoliated buccal mucosal cells in Behçet’s disease patients and healthy controls, and to evaluate the clinical characteristics of Behçet’s disease. Methods. Twenty five Behçet’s disease patients have been compared to 25 healthy volunteers as a control group. Papanicolaou stain was used for staining the smears taken from buccal epithelial cells to be analyzed cytomorphometrically. The image analysis sof

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Preparation and Characterization of Some Transition Metal Complexes with ( N ,S ,O) New Schiff Base Ligand
...Show More Authors

The New Schiff base ligand 4,4'-[(1,1'-Biphenyl)-4,4'-diyl,bis-(azo)-bis-[2-Salicylidene thiosemicarbazide](HL)(BASTSC)and its complexes with Co(II), Ni(II), and Cu(II) were prepared and characterized by elemental analysis, electronic, FTIR, magnetic susceptibility measurements. The analytical and spectral data showed, the stiochiometry of the complexes to be 1:1 (metal: ligand). FTIR spectral data showed that the ligand behaves as dibasic hexadentate molecule with (N, S, O) donor sequence towards metal ions. The octahedral geometry for Co(II), Ni(II), and Cu(II) complexes and non electrolyte behavior was suggested according to the analysis data.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of King Saud University - Computer And Information Sciences
Heuristic initialization of PSO task scheduling algorithm in cloud computing
...Show More Authors

View Publication
Scopus (142)
Crossref (94)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Multidimensional Systolic Arrays of LMS Algorithm Adaptive (FIR) Digital Filters
...Show More Authors

A multidimensional systolic arrays realization of LMS algorithm by a method of mapping regular algorithm onto processor array, are designed. They are based on appropriately selected 1-D systolic array filter that depends on the inner product sum systolic implementation. Various arrays may be derived that exhibit a regular arrangement of the cells (processors) and local interconnection pattern, which are important for VLSI implementation. It reduces latency time and increases the throughput rate in comparison to classical 1-D systolic arrays. The 3-D multilayered array consists of 2-D layers, which are connected with each other only by edges. Such arrays for LMS-based adaptive (FIR) filter may be opposed the fundamental requirements of fa

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Ieee International Rf And Microwave Conference (rfm)
Differential Evolution algorithm for linear frequency modulation radar signal denoising
...Show More Authors

Signal denoising is directly related to sample estimation of received signals, either by estimating the equation parameters for the target reflections or the surrounding noise and clutter accompanying the data of interest. Radar signals recorded using analogue or digital devices are not immune to noise. Random or white noise with no coherency is mainly produced in the form of random electrons, and caused by heat, environment, and stray circuitry loses. These factors influence the output signal voltage, thus creating detectable noise. Differential Evolution (DE) is an effectual, competent, and robust optimisation method used to solve different problems in the engineering and scientific domains, such as in signal processing. This paper looks

... Show More
View Publication
Scopus Crossref