Preferred Language
Articles
/
alkej-766
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Enhancement of functionalized carbon nanotubes gas sensor by adding metal oxide nanoparticles
...Show More Authors

Functionalized-multi wall carbon nanotubes (F-MWCNTs) and functionalized-single wall carbon nanotubes (F-SWCNTs) were well enhanced using CoO Nanoparticles. The sensor device consisted of a film of sensitive material (F-MWCNTs/CoONPs) and (F-SWCNTs/CoO NPs) deposited by drop- casting on an n-type porous silicon substrate. The two sensors perform high sensitivity to NO2 gas at room temperatures. The analysis indicated that the (F-MWCNTs/CoONPs) have a better performance than (F-SWCNTs/CoONPs). The F-SWCNTs/CoONPs gas sensor shows high sensitivity (19.1 %) at RT with response time 17 sec, while F-MWCNTs/CoONPs gas sensor show better sensitivity (39 %) at RT with response time 13 sec. The device shows a very reproducible sensor p

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Enhancement of Electron Temperature under Dense Homogenous Plasma by Pulsed Laser Beam
...Show More Authors

The applications of hot plasma are many and numerous applications require high values of the temperature of the electrons within the plasma region. Improving electron temperature values is one of the important processes for using this specification in plasma for being adopted in several modern applications such as nuclear fusion, plating operations and in industrial applications. In this work, theoretical computations were performed to enhance electron temperature under dense homogeneous plasma. The effect of   power and duration time of pulsed Nd:YAG laser   was studied on the heating of   plasmas  by inverse bremsstrahlung  for  several values for the electron density ratio. There results for these ca

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jul 28 2016
Journal Name
Computer And Information Science
Refinement for Ocular Ultrasound Images Quality by Utilizing Combination of Enhancement Techniques
...Show More Authors

Ultrasound has been used as a diagnostic modality for many intraocular diseases, due its safety, low cost, real time and wide availability. Unfortunately, ultrasound images suffer from speckle artifact that are tissue dependent. In this work, we will offer a method to reduce speckle noise and improve ultrasound image to raise the human diagnostic performance. This method combined undecimated wavelet transform with a wavelet coefficient mapping function: where UDWT used to eliminate the noise and a wavelet coefficient mapping function used to enhance the contrast of denoised images obtained from the first component. This methods can be used not only as a means for improving visual quality of medical images but also as a preprocessing

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 22 2023
Journal Name
Mesopotamian Journal Of Big Data
Parallel Machine Learning Algorithms
...Show More Authors

 To expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk abo

... Show More
View Publication
Scopus (23)
Crossref (15)
Scopus Crossref
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Mechanical Engineering
Corrosion Resistance Enhancement for Low Carbon Steel by Gas Phase Coating
...Show More Authors

Corrosion Resistance Enhancement for low carbon steel is very important to extend its life service, the coating process is one of the methods which can using to achieve this, and it's the most important in surface treatments to improve the properties of metals and alloys surfaces such as corrosion resistance. In this work, low carbon steel was nitrided and coated with nano zinc using gas phase coating technical, to enhance the resistance of corrosion. The process included adding two layers. The first, a nitride layer, was added by precipitating nitrogen (N) gas, and the second, a zinc (Zn) layer, was added by precipitating Zn. The process of precipitating was carried out at different periods (5, 10, and 15 minutes). Scan electron mi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref