Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Application Of Jit In The Banking Sector On The Quality Of Banking Service
...Show More Authors

Abstract 

          The research the impact of the application of some of the production system tools in the specified time, which can be adapted in the service sectors (banking sector) over the improvement and increase the quality of banking services, and highlights the research problem in the low quality of banking services provided to customers because of the reliance on traditional banking systems in the provision of services Because of the lack keep pace with global developments in the banking industry, and the goal of research is to clarify the applicability of the production system in the time specified in the service sector and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Monitoring Lotic Ecosystem by the Application of Water Quality Index (CCMEWQI)
...Show More Authors

Water Quality Index (WQI) as a tool to assess the water quality status provides advice related to the use of water quality monitoring data and it is a way for combining the complex water quality data into a single value or single statement.The present study was conducted on Al- Hilla river in the middle of Iraq from August 2012 to July 2013 at five selected stations in the river, from Al- Musaib city to Al- Hashimya at the south of Hilla to determine its suitability for aquatic environment (GWQI), drinking water (PWSI) and irrigation (IWQI).This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management, and decision making. According to th

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
Women in Higher Education in Iraq (2008- 2012
...Show More Authors

هدفت الدراسة لالقاء الضوء على وضع المرأة في التعليم العالي في العراق خلال الاعوام الدراسية: 2008 - 2009, 2010 – 2011 و2011- 2012. تتيح القوانين والتعليمات في التعليم العالي في العراق فرص متكافئة للاناث والذكور للتسجيل في الدراسات الاولية والعليا، وكذلك عدم التمييز في الرواتب الشهرية للمنتسبين وفقا لنوع الجنس (الجندر ). بلغ متوسط عدد الاناث في مرحلة الدراسة الاولية في مؤسسات التعليم العالي في العراق لثلا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الطفولة في العراق بين جهود التنمية وتحديـــات الوضــــع الراهــن قســم الخدمـة الاجتماعيـة
...Show More Authors

      اهتمت المجتمعات العالمية في الآونة الأخير بفئة الأطفال ، ورعاية الطفولة وذلك لما لها من أهمية كبيرة في مستقبل المجتمع ، وتنميتة وتقدمه . لأنها يعتمد عليها في تقدم وتطور المجتمع فـي جميع المجالات الاقتصادية والاجتماعية والثقافية . ومن هنا ارتبطت الطفولة بالحياة برباط عضوي فالأطفال براعم الحياة ومع هذه البراعم تستمر الحياة لذلك اهتمت دول العالم بوضع البرامج وعقد المؤتمرات من اجل النهوض

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The technique of converting multi-choice mathematical programming into linear mathematical programming to find the optimal solution
...Show More Authors

The study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دور بعض الأفعال المنظمية في إدارة الوقت دراسة مسحية في عينة من المكتبات الجامعية في بغداد
...Show More Authors

 The organizations recognize what the effective role of time management in achieving competitive advantage and success. But the effectiveness depends on integrating some organization actions which perspective are relating with it by significance relations and high affect. From this the research problem is arising، which descripe the recognizing of libraries managers for the role of some organizational actions. The samples from (40) libraries managers are chosen.

The major results: these organizational actions are related and affected on the time management  if integrated with  one anothers more than if related in separate.  &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
اثر التعلم المنظمي في التمكين الإداري دراسة استطلاعية لآراء عينة في الشركة العامة للصناعات الكهربائية في بغداد
...Show More Authors

This research aims at studying a contemporary and modern phenomenon in the Science of management in general and in the field of organizational behavior in private, The organizational learning and managerial empowerment in a governmental organization :"The General Company of Electric Industries" .The dimensions of organizational learning have been defined (Learning Dynamics، organization transformation, individuals empowerment, knowledge management and Technology application) as wells as the dimensions of managerial empowerment (possessing the information and its availability– Independency and the freedom of conduct and knowledge possession) Information has been gathered by a questionnaire distributed on a sample of professiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Integrated Information Technology System in Organizations “Exploratory Comparative Search for opinions of sample of Workers in the Faculties of Science & Education AL- Asma'I at the University of Diyala
...Show More Authors

       The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to

... Show More
View Publication Preview PDF
Crossref