Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
السرقات في المنظمات والعوامل المؤثرة فيها
...Show More Authors

Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts.

   

   The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases, of thefts occurred in the District, also a sample of (60) sp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
تأثير الذكاء الشعوري في الذكاء المنظمي دراسة تطبيقيه في الشركة العامة للصناعات الكهربائية
...Show More Authors

The two terms"of fective intelligece and organizational intelligence" is it is the emotional intelligency and organizational intelligency"are considered as one of the contemporany terms which the various organizations started to function them in their activities to in crease their efficiency.

This study aims at examining those two terms and the possibility of their functioning them in one of the general organizations and the questionnaire is used as atool to gather information that are distributed on asample consists of (50)employees and selected randomly from various organizationl levels.

The most important conclusions:<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية
...Show More Authors

ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Comparative Study of Gamma- Ray Shielding Parameters for Different Epoxy Composites
...Show More Authors

In the current work various types of epoxy composites were added to concrete to enhance its effectiveness as a gamma- ray shield. Four epoxy samples of (E/clay/B4C) S1, (E/Mag/B4C) S2, (EPIL) S3 and (Ep) S4 were used in a comparative study of gamma radiation attenuation properties of these shields that calculating using Mont Carlo code (MCNP-5). Adopting Win X-com software and Artificial Neural Network (ANN), µ/ρ revealed great compliance with MCNP-5. By applying (µ/ρ) output for gamma at different energies, HVL, TVL and MFP have been also estimated. ANN technique was simulated to estimate (µ/ρ) and dose rates. According to the results, µ/ρ of all epoxy samples scored higher than standard concrete. Both S2 and S3 samples having h

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
مفاهيم وتطبيقات لإمكانية التخطيط والتصميم المستدام في السكن
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
The rule of leading the boy in prayer
...Show More Authors

God Almighty has imposed on us obligations and set limits on us, and among these obligations is the prayer, which is considered a pillar of Islam. And recently on the statement of its importance, and through extensive explanations, they elaborated on the statement of its pillars, its obligations, its Sunnahs, its rituals, and its bodies, and it is known that the imam in prayer is an important part of the parts of prayer. Whoever assumes this responsibility must be aware of these conditions, the most important of which is jurisprudence in religion, and there has been a disagreement between the jurists, especially the owners of the four schools of thought, about who is qualified to lead the imamate, and this is within many and wide details

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
الأساليب التربوية في القرآن الكريم والسنة النبويةالأساليب التربوية في القرآن الكريم والسنة النبوية
...Show More Authors

        The most important characteristic of the methods of Islamic education inspired from the Koran it is not man-made, it is to estimate the creator of human beings, who sent down the book, he addresses their minds and their hearts and emotions and regulate their behavior, including Amati Aftrthm, and fits the psychological their composition, so that the effect of these methods up to the depths of hearts intense induction was contained in Holy Book and the correct year studied the Qur'an and reflect on the meaning and reflect on the purposes and goals 0, the better to speak the Word of God, and the best guidance is guided him, and for science at all to call God and teach

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
توظيف الشخصية في القصيدة الجديدة/ حميد سعيد انوذجا
...Show More Authors

This poem is regarded an important Harmonized structure in modern and Contemporary Culture to achieve aqualitative poem Comported with the other cultural structures inorder to discover the ego and aspiration in shaping distinctive voices.
The Iraqi poetry is affected tangibly by this poem because of the intellective vaccinating between Iraqi and Arab poets ingeneral and western cultures in particular as a result of the tranplahin movement and other important means.
The modern poet wood to ask some important characters to enrich his technician text inspite the fact that this is not a new way in Arab poetry but it takes avarant – criented to become outside the limits of rigid description within ongoing kinematic structure to be in

... Show More
View Publication Preview PDF