Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 21 2021
Journal Name
The 3rd Al-noor International Conference Of Science And Technology 2021 Muscat-oman
Gama Platform Survey for Agent-Based Modelling
...Show More Authors

The agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat

... Show More
View Publication
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Mon Jun 01 2020
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية/ الجزائر
The effect of using the five-finger strategy on learning movement chain on a balance beam in the artistic gymnastics of women
...Show More Authors

Abstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Food Chemistry
High performance liquid chromatographic determination of aflatoxins in chilli, peanut and rice using silica based monolithic column
...Show More Authors

A simple and rapid high performance liquid chromatographic with fluorescence detection method for the determination of the aflatoxin B1, B2, G1 and G2 in peanuts, rice and chilli was developed. The sample was extracted using acetonitrile:water (90:10, v/v%) and then purified by using ISOLUTE multimode solid phase extraction. After the pre-column derivatisation, the analytes were separated within 3.7 min using Chromolith performance RP-18e (100–4.6 mm) monolithic column. To assess the possible effects of endogenous components in the food items, matrix-matched calibration was used for the quantification and validation. The recoveries of aflatoxins that were spiked into food samples were 86.38–104.5% and RSDs were <4.4%. The method was

... Show More
View Publication
Scopus (91)
Crossref (82)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and in vitro /in vivo Evaluation of Silymarin Solid Dispersion- Based Topical Gel for Wound Healing
...Show More Authors

Silybum marianum, from which silymarin (SM) is extracted, is a medicinal herb. In the Biopharmaceutics Classification System, it is of the class II type, meaning it is almost completely insoluble in water. It has a number of therapeutic properties, including anti-inflammatory as well as properties that promote wound healing.

This research target is to promote the dissolution and solubility of SM by employing a technique called solid dispersion and then incorporating the formula of solid dispersion into a topical gel that can be used for wound healing.

 

Solid dispersion is a technique used to enhance solubility and dissolve pharmaceuticals that are not water-soluble. This method is widely used because of its low cos

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Environmental Technology &amp; Innovation
Biomineralization based remediation of cadmium and nickel contaminated wastewater by ureolytic bacteria isolated from barn horses soil
...Show More Authors

View Publication
Scopus (107)
Crossref (97)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Theory And Practice In Language Studies
A Socio-Pragmatic Study of Profanity and Derogatory Words in Doja Cat’s Songs: A Corpus-Based Study
...Show More Authors

Rap songs often feature artists who utilize explicit language to convey feelings such as happiness, sorrow, and anger, reflecting audience expectations and trends within the music industry. This study intends to conduct a socio-pragmatic analysis of explicit, derogatory, and offensive language in the songs of the American artist Doja Cat, employing Hughes’ (1996) Swearing Word Theory, Jay’s (1996) Taboo Words Theory, Luhr’s (2002) classification of social factors for sociolinguistic examination, Salager’s (1997) categories of hedges for pragmatic assessment, and Austin’s (1965, 1989) theory of speech acts. The researchers collected the data using the AntConc corpus analysis tool. The data shows the singer’s frequent use

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
The neology in the Iraqi dialect after the invasion of 2003 and the level of imaginative comprehension: La neología en el dialecto Iraqui tras la invasión de 2003 y el nivel de la comprensión imaginativa
...Show More Authors

       The article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The strategic recovery of the insurance service and its reflection on achieving the strategic goals: research My application in the National Insurance Company
...Show More Authors

The research topic dealt with the strategic recovery of the insurance service, which is one of the approaches that have an important role in providing solutions and remedies for the recession that affects companies and hinders them from achieving their strategic goals. The research also addressed the strategic objectives of the company as the rationale and actual guide for companies of all activities in order to protect their systems from deviation for its desired purpose. So the aim of the research is to demonstrate the repercussions of the strategic recovery of the insurance Service represented by (compensation, speed of response, apology, initiative (identifying the problem). The company's strategic goals are represented (prof

... Show More
View Publication Preview PDF