Preferred Language
Articles
/
ijs-497
Proposal Hybrid CBC Encryption System to Protect E-mail Messages
...Show More Authors

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher Block Chaining (CBC), Output Feedback (OFB), Cipher Feedback (CFB) and Electronic Code Block (ECB). CBC used to complex the cryptographic systems, by using Initialization Vector (IV), Xoring, and encryption with specified key over chain of blocks, but CBC is vulnerable to chosen plaintext attack because the IV is static and vulnerable to chosen ciphertext attack because the encryption method with the key are static. This paper introduce a proposed E-mail messages encryption systems , the proposal based on modified CBC mode operation hybrid with some of techniques exploited in the encryption such as RADG, DNA, RNA and a suggested permutation methods. The proposed modifications applied on the CBC are generate IV randomly, generate key randomly, and propose encryption method, these modifications proposed to avoid the attacks that CBC is vulnerable to.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Hybrid Images Compression and Transmitted Using MC-CDMA System
...Show More Authors

In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Comparative Study of Anemia Classification Algorithms for International and Newly CBC Datasets
...Show More Authors

Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative st

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Using of Coating Technique by Inorganic Flame Retardants to Protect Civil and Industrial Foundations from Fires
...Show More Authors

   In the present research the flame retardancy to  buildings and industrial foundations which are manufacturing from advanced polymeric  composite material was increased by coating it with surface layer included flame retardant material.  A(3mm) thick antimony tetroxide was used as a coated layer to retard and prevent the flame spread to the coating surface of polyester resin (SIROPOL 8340-PI) reinforced with hybrid fibers as a woven roving (°45-°0) consist of carbon and kevlar (49) fibers, and exposed it to direct flame generated from gas torch at temperature of (2000ºC), at  different exposed distance (10,15,20mm)and study the rang of resistance for this layer and its ability to protec

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Rules for Sustainable Development to Protect Working Women in Iraqi Labor Law No. 37 of 2015
...Show More Authors

Our research dealt with the issue of sustainable development related to the legal rules of the labor law in force to achieve the necessary protection for the rights of working women. The Iraqi labor law in force set several rules inspired by the texts of international conventions to protect working women at work. These rules were summarized in our research to the rules of protection from sexual harassment. At work, and the basis for obtaining decent work for women at work, Iraq was one of the countries organizing the Convention (CEDAW) that combats sexual harassment and gender discrimination, and which called for the importance of the presence of women in developing society and achieving the global goals of sustainable development. Devel

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
Advertises of Advertising Mail Post of Emirate of Dubai as a sample
...Show More Authors

 

                The advertising mail is considered as one of potential tools that followed to transfer the printed messages to the consumers and public customers whom are located at homes or works. This type of advertising is preferable due to the zero expense to receive the announcements of products, which became recently one of the successful procedures to create new customers and keep them in touch with direct communication. It is also possible to send them to specific group of people who can be classified by the advertisers to select even by name their own clients to give the personality to the clients for a long term of communication.

&

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of Optical Communications
Deployment of multiservice code in FSO-based hybrid subcarrier system
...Show More Authors
Abstract<p>This research aims to investigate and improve multi-user free space optic systems (FSO) based on a hybrid subcarrier multiplexing spectral amplitude coding-optical code division multiple access (SCM-SAC-OCDMA) technique using MS code with a direct decoding technique. The performance is observed under different weather conditions including clear, rain, and haze conditions. The investigation includes analyzing the proposed system mathematically using MATLAB and OptiSystem software. The simulation is carried out using a laser diode. Furthermore, the performances of the MS code in terms of angles of bit rate, beam divergence and noise are evaluated based on bit error rate (BER), received </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref