Preferred Language
Articles
/
bsj-3244
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called Chaotic-based Proposed Feistel Cipher System (CPFCS), we made the confusion and diffusion in dynamical behavior based on Standard and Lorenz maps. The first is used for substitution, and the second one for permutation operations .A proposed cryptographic system uses the same work (the same way) for both enciphering and deciphering. The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. Also, a 3D Logistic map used for key sequence generator and chaos based dynamical Initial Permutation (dynamical IP) are used to increase the diffusion and confusion. Three different image sizes and three different text length were implemented in CPFCS.  The results of the proposed system and security tests improve the applicability of PFCS in the data protection and security.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 15 2024
Journal Name
Journal Of Baghdad College Of Dentistry
A clinicopathological analysis of 151 odontogenic tumors based on new WHO classification 2022: A retrospective cross-sectional study
...Show More Authors

Background: Odontogenic tumors are a diverse group of lesions with a variety of clinical behavior and histopathologic subtypes, from hamartomatous and benign to malignant. The study aimed to examine the clinical and pathological features of odontogenic tumors in Baghdad over the last 11 years (2011–2021). Materials and Methods: The present retrospective study analyzed all formalin-fixed, paraffin-embedded tissue blocks of patients diagnosed with an odontogenic tumor that were retrieved from archives at a teaching hospital/College of Dentistry in Baghdad University, Iraq, between 2011 and 2021. The diagnosis of each case was confirmed by examining the hematoxylin and eosin stained sections by two expert pathologists. Data from pati

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Chaotic behaviour of the Rossler model and its analysis by using bifurcations of limit cycles and chaotic attractors
...Show More Authors

The behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.

View Publication
Scopus (37)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New phenolic Schiff bases Derivatives Based on Terephthaladehyde
...Show More Authors

A variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images.

So, this study aimed at testing the system performance at poor s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Shatt Al-Gharraf in Ancient and Modern Maps: سالار علي خضر
...Show More Authors

This research aims to shed light on the geography of Shatt Al-Gharraf, one of the main branches of the Tigris River south of the sedimentary plain, where the changes exposed by this Shatt (river) were followed by a set of old and modern maps, which date back to the years(3000 BC, 1771 AD, 1810 AD, 1944 AD, 1959 AD, 2009 AD, 2017 AD).Through this research, Shatt al-Gharrafwas found to be an integrated river in terms of the geomorphological phenomena of the rivers (river meanders, river islands, marshes, and estuary). Besides, it was exposed to several changes especially itsdownstream in the Euphrates. It was previously flowing into the Euphrates but due to a number of factors such as the shortage of water in the Tigris River in recent yea

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Weldability of New Material Sandwich Steel for Automotive Applications
...Show More Authors

Todays, World is faced an energy crisis because of a continuous increasing the consumption of fuels due to intension demand for all types of vehicles. This study is one of the efforts dealing with reduce the weight of vehicles by using a new material of sandwich steel, which consists of two skin steel sheets with core of a polymer material. Resistance spot welding (RSW) can be easily implemented on metals; however a cupper shunt tool was designed to perform the resistance welding of sandwich steel with DP800 cover sheets to resolve a non-conductivity problem of a polymer core. Numerical simulations with SORPAS®3D were employed to test the weldability of this new material and supported by many practical experiments. In conclus

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Synthesis, Cytotoxicity, Xanthine Oxidase Inhibition, Antioxidant of New Pyrazolo{3,4 d}Pyrimidine Derivatives
...Show More Authors

         Allopurinol derivative were prepared by reacting the (1-chloroacetyl)-2-Hydropyrazolo{3,4-d}pyrimidine-4-oneiwith 5- methoxy- 2-aminoibenzothiazoleiunder certain conditions to obtain new compound  ( N- (2-aminoacetyl (5-methoxy) benzothiazole -2yl) (A4), Reaction of 5-(P-dimethyl amine benzene)-2-amino-1,3,4- oxadiazole in the presence of potassium carbonate anhydrous to yield new  compound (N-(2- aminoacetyl-5-(P-dimethyl amine benzene )-1,3,4-oxadiazoles-2-yl)(A30) and Azo compound (N-(5-(Azo-2-hydroxy-5-amino benzene)-1,3-Diazol-2yl)Allopurinol(A46). The structure of prepared compounds were confirmed by (FT-IR)

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref