Preferred Language
Articles
/
bsj-5256
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order to provide high-quality random, unpredictable, and non-regenerated keys, the chaotic map has been used in the proposed system. In the experiments, the NIST statistical analysis which includes ten statistical tests has been employed to check the randomness of the generated binary bits key. The obtained random cryptographic keys are successful in the tests of NIST, in addition to a considerable degree of aperiodicity.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Optimization of process parameters for biodiesel production from three indigenous vegetable oils
...Show More Authors

Optimization procedures using a variety of input parameters have gotten a lot of attention, but using three non-edible seed oils of Jatropha (Jatropha curcas), Sesame (Sesamum indicum), and Sweet Almond (Prunusamygdalus dulcis) has a few advantages, including availability and non-food competitiveness. Optimizing a two-stage trans-esterification process using a sodium hydroxide-based catalyst at a fixed catalyst (1.0wt %) and temperature (60 oC) while varying molar ratio (1:3, 1:6, 1:12),  time (20–60 min), and mixing speed (500–1000 rpm), to produce optimal responses of yields were studied using response surface methodology (RSM). The optimization solution of molar ratio (1:3), time (40.9 min.),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Biomathematics
A non-conventional hybrid numerical approach with multi-dimensional random sampling for cocaine abuse in Spain
...Show More Authors

This paper introduces a non-conventional approach with multi-dimensional random sampling to solve a cocaine abuse model with statistical probability. The mean Latin hypercube finite difference (MLHFD) method is proposed for the first time via hybrid integration of the classical numerical finite difference (FD) formula with Latin hypercube sampling (LHS) technique to create a random distribution for the model parameters which are dependent on time [Formula: see text]. The LHS technique gives advantage to MLHFD method to produce fast variation of the parameters’ values via number of multidimensional simulations (100, 1000 and 5000). The generated Latin hypercube sample which is random or non-deterministic in nature is further integ

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Back stepping-Based-PID-Controller Designed for an Artificial Pancreas model
...Show More Authors

Artificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose

 

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Industrial Laboratory. Materials Diagnostics
OPTIMIZATION OF PLASMA-ASSISTED DESORPTION/IONIZATIONMASS SPECTROMETRY FOR ANALYSIS OF IBUPROFEN
...Show More Authors

In medical practice, nonsteroidal anti-inflammatory drugs (NSAIDs) are often used to treat osteoarthritis and rheumatoid arthritis. Ibuprofen is a well-known NSAID, analgesic, and antipyretic medication. This chemical is an active ingredient of several oral medications that are offered in tablet, gel pellet, and syrup forms and has higher efficacy, tolerance, and side effect rates than other compounds, including pyrazolone derivatives. We present a unique plasma-assisted desorption/ionization mass spectrometry (PADI-MS) approach for improving pharmaceutically important solids using an ibuprofen tablet as a model solid sample. The goal of the study is to create an innovative mass spectrometric method that could be used for quick and accur

... Show More
Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Formal coding and its relationship to aesthetic taste among students of the Department of Art Education
...Show More Authors

The current research aims to identify pictorial coding and its relationship to the aesthetic taste of art education students. The research community consisted of (10) plastic artworks, and (3) artworks were selected as a sample for analysis and decoding. With the aim of the research, the research tool was prepared as it consisted of an analysis form, and the researcher used statistical methods: Equation (Cooper) to find the percentage of agreement between the arbitrators and the equation (Scott) to calculate the validity of the tool, and the correlation coefficient (Pearson) to extract stability in the method of segmentation half. Shape formations and achieve encryption of the plastic image through decoding symbols, meanings, and the sig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Mar 19 2013
Journal Name
Arabian Journal Of Geosciences
Palynomorph stratigraphy, palynofacies and organic geochemistry assessments for hydrocarbon generation of Ratawi Formation, Iraq
...Show More Authors

View Publication
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref