Preferred Language
Articles
/
Vhg2WZQBVTCNdQwCvAVr
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brute-force attacks, due to its big key space size and sensitivity to initial values. This algorithm be responsible for a forceful and flexible solution for acquiring secure images, appropriate for high resolution data and real time applications.

Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Detour Polynomials of Generalized Vertex Identified of Graphs
...Show More Authors

The Detour distance is one of the most common distance types used in chemistry and computer networks today. Therefore, in this paper, the detour polynomials and detour indices of vertices identified of n-graphs which are connected to themselves and separated from each other with respect to the vertices for n≥3 will be obtained. Also, polynomials detour and detour indices will be found for another graphs which have important applications in Chemistry.

 

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Studying the partial substitution of barium with cadmium oxide and its effect on the electrical and structural properties of HgBa2Ca2Cu3O8+δ superconducting compound
...Show More Authors

View Publication
Scopus (24)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Political Transformations in The Republic of Turkmenistan During the Period (1991-2021)
...Show More Authors

After the fall of the Soviet Union, a number of Eastern Bloc countries and Soviet republics have witnessed political transition. However, Turkmenistan, as one of the former Soviet republics, succeeded to preserve the authoritarian nature of the former Soviet regime. This study seeks to answer a number of research questions, the most prominent of which are: How were the political elite in Turkmenistan able to preserve the legacy of the Soviet policy based on centralization of power and individual rule?. The study reaches a set of conclusions, the most important of which are:

1-The roots of the tyranny in Turkmenistan are du to internal and external structural factors. The most important of which are: the former Soviet policies of m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (26)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Fast Computation of Hahn Polynomials for High Order Moments
...Show More Authors

View Publication
Scopus (36)
Crossref (36)
Scopus Clarivate Crossref