Preferred Language
Articles
/
axfH5JMBVTCNdQwC3-tZ
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
NEW ROBUST ESTIMATOR OF CHANGE POINT IN SEGMENTED REGRESSION MODEL FOR BED-LOAD OF RIVERS
...Show More Authors

View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Influence of fly ash on the volumetric and physical properties of Stone Matrix Asphalt Concrete
...Show More Authors

Stone Matrix Asphalt (SMA) is a gap-graded asphalt concrete hot blend combining high-quality coarse aggregate with a rich asphalt cement content. This blend generates a stable paving combination with a powerful stone-on-stone skeleton that offers excellent durability and routing strength. The objectives of this work are: Studying the durability performance of stone matrix asphalt (SMA) mixture in terms of moisture damage and temperature susceptibility and Discovering the effect of stabilized additive (Fly Ash ) on the performance of stone matrix asphalt (SMA) mixture. In this investigation, the durability of stone matrix asphalt concrete was assessed in terms of temperature susceptibility, resistance to moisture damage, and sensitivity t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Random Number Generation for Quantum Key Distribution Systems Based on Shot-Noise Fluctuations in a P-I-N Photodiode
...Show More Authors

A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties
...Show More Authors

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On Additivity of Jordan Higher Mappings on Generalized Matrix Algebras
...Show More Authors

In this article, the additivity of higher multiplicative mappings, i.e., Jordan mappings, on generalized matrix algebras are studied. Also, the definition of Jordan higher triple product homomorphism is introduced and its additivity on generalized matrix algebras is studied.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Environmental Engineering Research
Development of Bi-Langmuir model on the sorption of cadmium onto waste foundry sand: Effects of initial pH and temperature
...Show More Authors

The present study develops the sorption model for simulating the effects of pH and temperature on the uptake of cadmium from contaminated water using waste foundry sand (WFS) by allowing the variation of the maximum adsorption capacity and affinity constant. The presence of two acidic functional groups with the same or different affinity is the basis in the derivation of the two models; Model 1 and Model 2 respectively. The developed Bi-Langmuir model with different affinity (Model 2) has a remarkable ability in the description of process under consideration with coefficient of determination > 0.9838 and sum of squared error < 0.08514. This result is proved by FTIR test where the weak acids responsible of cadmium ions removal

... Show More
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Jordan Left Derivation and Centralizer on Skew Matrix Gamma Ring
...Show More Authors

We define skew matrix gamma ring and describe the constitution of Jordan left centralizers and derivations on skew matrix gamma ring on a  -ring. We also show the properties of these concepts.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus Crossref