Preferred Language
Articles
/
bsj-7315
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Turbid of Water By Using Fuzzy C- Means and Hard K- Means
...Show More Authors

In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected  from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Relationship of Digital Skills with the Professional Competence of Kindergarten Teachers
...Show More Authors

The current research aims to identify the level of digital skills of kindergarten teachers, identify the level of professional competence of kindergarten teachers, as well as to identify the relationship between digital skills and the professional competence of kindergarten teachers. The current research was determined by kindergarten teachers in the second Baghdad / Karkh Education Directorate for the academic year (2021-2022). The research sample consisted of (100) teachers chosen in a simple random way. To achieve the objectives of the research, the researcher developed a digital skills scale of (20) items and a scale of professional competence consisting of (22) items. The results revealed that kindergarten teachers have a high level

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 25 2021
Journal Name
Engineering And Technology Journal
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Determination of Nickel and Cobalt in Cosmetic Products Marketed in Iraq Using Spectrophotometric and Microfluidic Paper-based Analytical Device (µPADs) Platform
...Show More Authors

Two quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref