Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Formulas The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study.: The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study
...Show More Authors

Research Summary :

      Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both;  the Arabic  language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an  imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
the kincetic studies of lh binding in benign an malignant uterine
...Show More Authors

kinetic studies were carried out the uterine homogenate time course of the association of with LH in benign and malignant uterine

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Hair Is An Indicator Oe Human Pollutants With The Toxic Substances
...Show More Authors

Hair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.

View Publication Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Design Criteria of an Activated Carbon Bed for Dechlorination of Water
...Show More Authors

Granular carbon can be used after conventional filtration of suspended matter or, as a combination of filtration - adsorption medium. The choice of equipment depends on the severity of the organic removal problem, the availability of existing equipment, and the desired improvement of adsorption condition.
Design calculations on dechlorination by granular - carbon filters considering the effects of flow rate, pH , contact time, head loss and bed expansion in backwashing , particle size, and physical characteristics were considered assuming the absence of bacteria or any organic interface .

View Publication Preview PDF
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
AN ABNORMAL GENITALIA IN CIOJNDELA AULICE DEJ. (COLEOPTERA: CICINDELIDAE) FROM IRAQ
...Show More Authors

Phenomena of an abnormal genitalia was among some specimens of Cicindela aulica Dej.
Collected from Iraq. The fore tarsi of male were asymmetrical having its basal three segments
dilated and clothed beneath with fine bristles as in normal male. While those of the right leg
were found simple as in normal females. Dissection of the genialia of these specimens
showed that they were of two types of both male and female structures.

View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
An online COVID-19 self-assessment framework supported by IoMT technology
...Show More Authors
Abstract<p>As COVID-19 pandemic continued to propagate, millions of lives are currently at risk especially elderly, people with chronic conditions and pregnant women. Iraq is one of the countries affected by the COVID-19 pandemic. Currently, in Iraq, there is a need for a self-assessment tool to be available in hand for people with COVID-19 concerns. Such a tool would guide people, after an automated assessment, to the right decision such as seeking medical advice, self-isolate, or testing for COVID-19. This study proposes an online COVID-19 self-assessment tool supported by the internet of medical things (IoMT) technology as a means to fight this pandemic and mitigate the burden on our nation</p> ... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
International Journal Of Medical Informatics
An artificial intelligence approach to predict infants’ health status at birth
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the investments Iraqi fund External Development /an applied study
...Show More Authors

The research aims to evaluate Evaluation of the investments Iraqi fund for External development through the application of financial tools to a number of companies of the Iraqi Fund for External Development, and from the point of view to achieve the best returns from investment and the feasibility of the investments of the Iraqi Fund for External Development and the research community represents the Iraqi Fund for External Development and the amount of (28) A company, while the research sample is (4) companies (the Arab Petroleum Transportation Services Company, the Arab Iraqi Company for Livestock Development, the Bauhaus Company for prefabricated buildings and mineral installations, the Arab Fisheries Company) that were chosen

... Show More
View Publication Preview PDF
Crossref