Preferred Language
Articles
/
ijs-241
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Crossref (4)
Crossref
View Publication
Publication Date
Thu Jun 15 2023
Journal Name
International Journal Of Nanoscience
Fabrication and Enhancement of Organic Photodetectors Based on Iron Phthalocyanine Films

Iron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Ishraqat Tanmawia
View Publication
Publication Date
Mon Aug 01 2016
Journal Name
2016 3rd International Conference On Computer And Information Sciences (iccoins)
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
Scopus (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Printmaking Techniques to Enable People with Visual Impairment to Taste Print Artworks

The study aims to integrate the visually impaired people into the art connoisseur community through producing special print artworks to enable the visually impaired people to use their other senses to feel artworks by using artistic printing techniques through adding some prominent materials to the printing colors or making an impact that visually impaired people can perceive using their other senses. This study also aims to set up art exhibitions that display tangible works that can enable visually impaired people to feel artwork and understand its elements to enable them to feel it through other senses.
The study follows the experimental method, through using artistic printing techniques, which allow printing with prominent textur

... Show More
Crossref
View Publication Preview PDF