Preferred Language
Articles
/
bsj-5751
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Synthesis and characterization of new phthalimide with 6- mercaptopurine or 2- aminothiazole conjugate used dithiocarbamate spacer as anticancer agents
...Show More Authors

View Publication
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Synthesis and study the liquid crystalline properties of new compounds containing 5-methyl-2,4-dihydro-3H-pyrazol-3-one
...Show More Authors
Abstract<p>The new compounds of pyrazolines were synthesized from the reaction of different acid hydrazide with ethylacetoacetate and ethanol under reflux. These compounds were obtained from many sequence reactions. The 4-acetyl-5-methyl-2,4-dihydro-3H-pyrazol-3-one compounds synthesized from the reaction of 5-methyl-2,4-dihydro-3H-pyrazol-3-one with acetyl chloride in calcium hydroxide and 1,4-dioxane. Finaly, Schiff bases were prepared via condensation reaction of products of mono- and tri ketone derivatives[IV]<sub>a, b</sub> with phenyl hydrazines as presented in (Scheme 1, 2). The synthesized compounds were identification by using FTIR, NMR and Mass spectroscopy (of some of them).</p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 21 2025
Journal Name
Applied Biochemistry And Biotechnology
Synthesis and characterization of new (Au, Ru, and Rh) ion complexes and evaluating their activity as anticancer and antioxidants
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 1999
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
New Records And Some Notes On The Broad Bean Root Aphids and Their Natural Enemies in Hammam Al-Alil
...Show More Authors

In May 20th. 1985 two species of aphids were found on the roots of Vicia faba L. in Hammam region 30 Kilometer south of Mosul. Samples of these aphids were sent to the Commonwealth Institute of Entomology, London. ( No. 17002/9804 Asia ) and identified as being Smynthurodes betas westwood and Dysaphis crataegi (Kaltenbach) (APhididae : Homoptera). The first species was dominant. The latter species was also noticed on the roots of the common bishop's weed (Ammi majus L.) and on the wide carrot (Daucus carrota L.) of the family Umbelliferae (Bodenheimer & Swirski, 1957).

View Publication Preview PDF
Publication Date
Sun Jun 13 2021
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Characterization and Anticorrosion Studies of New Co(II), Ni(II), Cu(II), and Zn(II) Schiff Base Complexes
...Show More Authors

The research included preparation of new Schiff base (L) by two steps: preparation of precursor [bis(2-formyl-6-methoxyphenyl) succinate] (P) by reacting (3-methoxy salicyl aldehyde) with (succinoyl dichloride) as first step then react the prepared precursor (P) with (ethanethioamide) to have the new Schiff base [bis(2-((ethane thioyl imino) methyl)-6-methoxy phenyl) succinate] (L) as second step. Characterized compounds based on Mass spectra, 1 H, 13CNMR (for ligand (L)), FT-IR and UV spectrum, melting point, molar conduct, %C, %H, and %N, the percentage of the metal in complexes %M, magnetic susceptibility, while study corrosion inhibition (mild steel) in acid solution by weight loss. These measurements proved that by (Oxygen, Nitrogen, a

... Show More
Publication Date
Sat Jun 01 2024
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis and Study the Biological Activity of Some New Pyrazole Compounds Containing 1,3,4-Oxadiazole Unite Through Vilsmeier–Haack Reaction
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (33)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Post COVID-19 Effect on Medical Staff and Doctors' Productivity Analysed by Machine Learning
...Show More Authors

The COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (13)
Scopus Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة طرائق تقدير معلمات توزيع كاما ذي المعلمتين في حالة البيانات المفقودة باستخدام المحاكاة
...Show More Authors

The estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth

... Show More
View Publication Preview PDF
Crossref