Preferred Language
Articles
/
ijs-3606
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of all image pixels based on a 1D logistic map to build IP table. Secondly, a new S-Box based on 2D-Henon chaos was created using more confusion to replace G-channel image data. Finally, design of a modern image encryption approach. This approach uses the key process confusion and diffusion operation and depend on IP and S-Box proposals in the encryption process and several shuffling operations using the 3D- Lornez chaos theory. Theoretical research and simulation suggest that starting sensitivity value of this method is high, has high protection, and encryption speed. Moreover, it also holds the value of the neighboring RGB close to zero. The studies show that the information security capabilities would be both safer and more efficient, as a result of our image quality assessment study. Number of Differential Pixel Rate Change Attacks (NPSR), Unified Average Altered Intensity (UACI), are quality and strength of encryption processing are proved by pixel correlation, Entropy to be good results.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drop Interface Coalescence in Liquid-Liquid System
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Al-kindy College Medical Journal
Automation of the Healthcare System in Iraq
...Show More Authors

In the last few years, following the relative stability of the political, economic, and security environments, Iraq has embarked on a transformation towards an ambitious program of automation across various sectors. However, this automation program faces numerous challenges, including significant investments in technology and training, addressing social impacts, and combating widespread illiteracy

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
LOW COST AUTOMATIC SUN PATH TRACKING SYSTEM
...Show More Authors

Solar tracking systems used are to increase the efficiency of the solar cells have attracted the attention of
researchers recently due to the fact that the attention has been directed to the renewable energy sources. Solar tracking systems are of two types, Maximum Power Point Tracking (MPPT) and sun path tracking. Both types are studied briefly in this paper and a simple low cost sun path tracking system is designed using simple commercially available component. Measurements have been made for comparison between fixed and tracking system. The results have shown that the tracking system is effective in the sense of relatively high output power increase and low cost.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Design Mobile Application for Blood Donation System
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 30 2018
Journal Name
Proceedings Of The International Conference On Intelligent Science And Technology
The nature of intelligent system in buildings
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Modified alvarado scoring system. How much helpful?
...Show More Authors

Background:-The Modified Alvarado Scoring System (MASS) has been reported to be a cheap and quick diagnostic tool in patients with acute appendicitis. However, differences in diagnostic accuracy have been observed if the scores were applied to various populations and clinical settings.
Objectives:- The purpose of this study was to evaluate the diagnostic value of Modified Alvarado Scoring System in patients with acute appendicitis in our setting.
Methods:-one hundre twenty eight patients ,were included in this study, admitted to Al-Kindy teaching hospital from June 2009 to June 2010. Patients’ age ranged from 8 to 56 years (21±10) they were divided into three groups; paediatrics, child bearing age females & adult males,. MAS

... Show More
View Publication Preview PDF