Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Parametric Study of Active Solar Heating Using a Pebble Bed as a Thermal Collector and Storage Unit
...Show More Authors

In this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperatur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Laser Hole Drilling of Stainless Steel 321H and Steel 33 Using 3D CO2 Laser CNC Machine
...Show More Authors

In present work an investigation for precise hole drilling via continuous wave (CW) CO2 laser at 150 W maximum output power and wavelength 10.6 μm was achieved with the assistance of computerized numerical controlled (CNC) machine and assist gases. The drilling process was done for thin sheets (0.1 – 0.3 mm) of two types of metals; stainless steel (sst) 321H, steel 33 (st). Changing light and process parameters such as laser power, exposure time and gas pressure was important for getting the optimum results. The obtained results were supported with computational results using the COMSOL 3.5a software code.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Active Vibration Suppression of Smart Cantilever Beam with Sliding Mode Observer Using Two Piezoelectric Patches
...Show More Authors

This paper presents a vibration suppression control design of cantilever beam using two piezoelectric ‎patches. One patch was used as ‎an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. ‎the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state ‎estimation error is proved bounded. An ‎optimal LQR controller is designed then using the ‎estimated states with the slid

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Best Multiplier Approximation of Unbounded Periodic Functions in L_(p,∅_n ) (B),B=[0,2π] Using Discrete Linear Positive Operators
...Show More Authors

The purpose of this paper is to find the best multiplier approximation of unbounded functions in    –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the impact of foreign direct investment in the Iraqi tax system using the factorial analysis: (principal components)
...Show More Authors

The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural  reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.

The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study  the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of BASE methods with other methods for estimating the measurement parameter for WEBB distribution using simulations
...Show More Authors

  Weibull distribution is considered as one of the most widely  distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.

   In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
GEOMETRIC NONLINEAR TIME DOMAIN SPECTRALMATCHING SEISMIC ANALYSIS OF BASE ISOLATED HIGHRISE BUILDINGS INCLUDING P-DELTA EFFECT
...Show More Authors

Time-domain spectral matching commonly used to define seismic inputs to dynamic analysis in terms of acceleration time history compatible with a specific target response spectrum is used in this study to investigate the second-order geometric effect of P-delta on the seismic response of base-isolated high-rise buildings. A synthetic time series is generated by adjusting reference time series that consist of available readings from a past earthquake of the 1940 El Centro earthquake adopted as an initial time series. The superstructure of a 20-story base isolated building is represented by a 3-D finite element model using ETABS software. The results of the base isolated building show that base isolation technique significantly reduces inter-s

... Show More
Publication Date
Tue Dec 22 2020
Journal Name
Lecture Notes In Civil Engineering
Geometric Nonlinear Synthetic Earthquake Analysis of Base Isolated Tall Steel Buildings Under Site-Specific Seismic Loading
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref