Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimate the Parallel System Reliability in Stress-Strength Model Based on Exponentiated Inverted Weibull Distribution
...Show More Authors
Abstract<p>In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (<italic>R<sub>k</sub> </italic>) contain <italic>K<sup>th</sup> </italic> parallel components in the stress-strength model, when the stress and strength are independent and non-identically random variables and they follow two parameters Exponentiated Inverted Weibull Distribution (EIWD). Comparisons among the proposed estimators were presented depend on simulation established on mean squared error (MSE) criteria.</p>
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (45)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
The Effect of Combination Ovariectomy and D-galactose Administration on Alzheimer's Animal Model
...Show More Authors

Background and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
discriminate analysis and logistic regression existence of multicolleniarty problem(Empirical Study on Anemia)
...Show More Authors

The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search the comparison between binary lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Form that is a Proposed of Procedures for Auditing the Technical Reserves of General Insurances Branches in the Insurance Activity : applied research
...Show More Authors

The research aims to identify the theoretical framework of technical reserves in the insurance activity and the role of the auditor in verifying the integrity of the estimates of technical provisions (technical reserves) for the branches of general insurance in insurance companies based on the relevant international auditing standards, as a proposed audit program has been prepared in accordance with international auditing standards that enable the auditor to express a sound opinion on the fairness of the financial statements of these companies , The research has reached many conclusions, the most important of which is the existence of deficiencies in the audit procedures of insurance companies, as the audit program of those companies did

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between some well- Known methods to estimate the parameter of the proposed method of measurement and the reliability of the distribution function with two parameters Rally by simulation
...Show More Authors

 

 

Abstract

            Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Central Bank control of external transfers and its impact on the tax information system: Applied research in the General Authority for Taxes
...Show More Authors

Tax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information

... Show More
View Publication Preview PDF
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF