Preferred Language
Articles
/
bsj-4882
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.

communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption  algorithm,  as can be observed in the entropy and other obtained values.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Stability and Dynamic Analysis of Laminated Composite Plates
...Show More Authors

Buckling and free vibration analysis of laminated rectangular plates with uniform and non uniform distributed in-plane compressive loadings along two opposite edges is performed using the Ritz method. Classical laminated plate theory is adopted. The static component of the applied in- plane loading are assumed to vary according to uniform, parabolic or linear distributions. Initially, the plate membrane problem is solved using the Ritz method; subsequently, using Hamilton’s variational principle, linear homogeneous algebraic equations in terms of unknown are generated, the set of linear algebraic equations can be solved as an Eigen-value problem. Buckling loads for laminated plates with different combinations of bounda

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Compensation of the Nonlinear Power Amplifier by Using SCPWL Predistorter with Genetic Algorithm in OFDM technique
...Show More Authors

The High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic al

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 03 2019
Journal Name
Iraqi Journal Of Physics
Experimental observation of the far field diffraction patterns of functionalization single and multi-walled carbon nanotubes using nonlinear diffraction technique
...Show More Authors

Nonlinear diffraction pattern can be induced by focusing CW
laser into a thin quartzes cuvette containing nanofluid. The number
of revealed pattern rings indicates to the nonlinear behavior of fluid.
Here, the nonlinear refractive index of each of functionalized single
wall carbon nanotube (F-SWCNTs) suspention and multi wall carbon
nanotube (F-MWCNTs) suspention have been investigated
experimentally .Each of CNTs suspention was at volume fraction of
13×10−5 and 6×10−5. Moreover the laser source at wavelength of
473 nm was used. The results show that SWCNTs suspention
possesses higher nonlinearty than other at the same volume fraction

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 25 2023
Journal Name
Molecular Simulation
Engineering promising A-π-D type molecules for efficient organic-based material solar cells
...Show More Authors

Within this work, to promote the efficiency of organic-based solar cells, a series of novel A-π-D type small molecules were scrutinised. The acceptors which we designed had a moiety of N, N-dimethylaniline as the donor and catechol moiety as the acceptor linked through various conjugated π-linkers. We performed DFT (B3LYP) as well as TD-DFT (CAM-B3LYP) computations using 6-31G (d,p) for scrutinising the impact of various π-linkers upon optoelectronic characteristics, stability, and rate of charge transport. In comparison with the reference molecule, various π-linkers led to a smaller HOMO–LUMO energy gap. Compared to the reference molecule, there was a considerable red shift in the molecules under study (A1–A4). Therefore, based on

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 20 2016
Journal Name
Sociological Methods & Research
Mean Monte Carlo Finite Difference Method for Random Sampling of a Nonlinear Epidemic System
...Show More Authors

In this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained fo

... Show More
View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Emergency Messages Dissemination Challenges Through Connected Vehicles for Efficient Intelligent Transportation Systems: A Review
...Show More Authors

Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Nov 10 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of an Iraqi phosphate-bonded investment and a commercial type on the marginal fit of ceramometalcopings using three different investing and burnout techniques
...Show More Authors

Background: The accuracy of fitness of any dental casting is imperative for the success of any prosthodontic treatment. From the time that dental casting was first introduced, efforts have been made to produce more accurate and better fitted castings with minimal marginal discrepancy. The aim of this in vitro study was to evaluate the effects of three different investing and burnout techniques on the vertical marginal discrepancies ofceramometalcopings invested with two types of phosphate- bonded investments. Materials and methods: Sixty wax patterns were fabricated on a standardized prepared brass die representing an upper central incisor by the aid of a custom-made split mold. Three different investing and burnout techniques were applied

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The application target cost technique by using reverse engineering: An application study in the general company for vegetable oils industry
...Show More Authors

The Purpose of this study is mainly to improve the competitive position of products economic units using technique target cost and method reverse engineering and through the application of technique and style on one of the public sector companies (general company for vegetable oils) which are important in the detection of prices accepted in the market for items similar products and processing the problem of high cost which attract managerial and technical leadership to the weakness that need to be improved through the introduction of new innovative solutions which make appropriate change to satisfy the needs of consumers in a cheaper way to affect the decisions of private customer to buy , especially of purchase private economic units to

... Show More
View Publication Preview PDF