Preferred Language
Articles
/
bsj-927
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In our work, there are two types of keys; the first type is the keystream that is adopted by the stream cipher stage with optimal length (length of the keystream greater or equal the message length); and the second key type is the final weights that are obtained from the learning process within the neural network stage, So we can represent our work as an update or development for using the neural network to enhance the security of stream cipher. As a result for a powerful hybrid design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Environmental Engineering And Science
Fenton-like degradation of direct blue dye using green synthesised Fe/Cu bimetallic nanoparticles
...Show More Authors

This study relates to synthesis of bentonite-supported iron/copper nanoparticles through the biosynthesis method using eucalyptus plant leaf extract, which were then named E-Fe/Cu@B-NPs. The synthesised E-Fe/Cu@B-NPs were examined by a set of experiments involving a heterogeneous Fenton-like process that removed direct blue 15 (DB15) dye from wastewater. The resultant E-Fe/Cu@B-NPs were characterised by scanning electron microscopy, Brunauer–Emmet–Teller analysis, zeta potential analysis, Fourier transform infrared spectroscopy and atomic force microscopy. The operating parameters in batch experiments were optimised using Box–Behnken design. These parameters were pH, hydrogen peroxide (H2O2

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Biosorption of Lead, Cadmium and Nickle from Industrial Wast water by Using Dried Macroalgae
...Show More Authors

Biosorpion of lead (Pb), Cadmium (Cd) and Nickl(Ni) by dried biomass of Chara sp. for sample of BMP was used as alternative approach of conventional method. The range of removal percentages was between 92-97%, 70-98.7% and 46.6-96.6% for Pb, Cd and Ni respectively at 3h.Treatment time, with 300-500 mg dried weight from Chara sp. powder at pH 4, with 60 rpm at shaker. FTIR analysis showed the active groups which are responsible for sequestration of heavy metals represented by carboxyl, hydroxyl alkyl, amine and amide. The Biosorption equilibrium experiment for elements showed that the highest sorption percentage for three elements was, Pb 96.6% after 30 minute, for Cd was 100% after 15 minute and 40% to Ni after 75 minute, while the biosorp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Lineament automatic extraction analysis for Galal Badra river basin using Landsat 8 satellite image
...Show More Authors

This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Desulphurization of Simulated Oil Using SAPO-11 with CNT's as Adsorbent: A Kinetic Study
...Show More Authors

In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 cont

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Azo Coupling Reaction for indirect Spectrophotometric Determination of Furosemide using Resorcinol as a Reagent
...Show More Authors
Abstract<p>A simple and accurate method to determinate furosemide (FUR) based on converting the secondary amine to primary amine with acidic hydrolysis then azotization by nitrous acid and coupled with resorcinol as a coupling agent in aqueous medium at pH 13. The optical characteristic like beers law limit found to be (0.25-2.5) μg.ml<sup>−1</sup>, detection and quantification limits (0.0196) (0.0654) μg.ml<sup>−1</sup>respectivly and Sandel sensitivity was 0.006738 μg.cm<sup>−2</sup>. The least-square method was used to evaluate the regression equation and the correlation coefficient. The resulted azo dye has a maximum absorbance at 430 nm with light oran</p> ... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue May 04 2021
Journal Name
Journal Of Tribology
Hardened Edges Effects on Wear Characteristics of Cultivator Sweeps Using Circular Soil Bin Test
...Show More Authors
Abstract<p>Tillage tools are subject to friction and low-stress abrasive wear processes with the potential deterioration of the desired soil quality, loss of mechanical weed efficacy, and downtime for replacing worn tools. Limited experimental methods exist to quantify investigate the effect of wear-resistant coatings on shape parameters of soil-engaging tools. ASTM standard sand/rubber wheel abrasion and pin-on-disk tests are not able to simulate wear characteristics of the complex shape of the tillage tools. Even though the tribology of tillage tools can be realistic from field tests, tillage wear tests under field conditions are expensive and often challenging to generate repeatable engineeri</p> ... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref