Preferred Language
Articles
/
bsj-5751
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Using Dates Leaves Midribs to Prepare Hierarchical Structures Incorporating Porous Carbon and Zeolite A Composites for Cesium137Cs Ion Exchange
...Show More Authors

This study synthesized zeolite 4A, and hierarchical composite structure consisting of zeolite 4A- carbon were successfully prepared. Hydrothermal method was used to grow a layer of zeolite 4A over porous carbon surfaces to enhance mass transfer and increase surface area of zeolite. The products then were used to remove radioactive cesium137Cs from liquid wastewater. Iraqi dates leaves midribs (DM) were used as locally available agricultural waste to prepare low- cost porous carbon, using carbonization method in tubular furnace at 900C for two hours. Hierarchical porous structures including zeolite are prepared by mechanically activating the carbon surface via Ultrasonicating nanoparticles suspension of ground zeolite type 4A.F

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Compact MIMO Slots Antenna Design with Different Bands and High Isolation for 5G Smartphone Applications
...Show More Authors

 In this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang

... Show More
View Publication Preview PDF
Scopus (10)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Stability of Complement Degree Polynomial of Graphs
...Show More Authors

     A graph is a structure amounting to a set of objects in which some pairs of the objects are in some sense related. The objects correspond to mathematical abstractions called vertices (also called nodes or points) and each of the related pairs of vertices is called an edge (also called link or line). A directed graph is a graph in which edges have orientation. A simple graph is a graph that does not have more than one edge between any two vertices and no edge starts and ends at the same vertex.  For a simple undirected graph G with order n, and let  denotes its complement. Let δ(G), ∆(G) denotes the minimum degree and maximum degree of G respectively. The complement degree polynomial of G is the polynomial CD[G,x]= , where C

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 المسائل المتعلقة بالأسماء الثابتة لله (عزوجل) الواردة في (مرعاة المفاتيح شرح مشكاة المصابيح، لأبي الحسن المباركفوري (ت1414هـ).
...Show More Authors

The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.

View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the orig

... Show More
View Publication Preview PDF