Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Offline signatures matching using haar wavelet subbands
...Show More Authors

The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Stabilization of Clay Soil Using Tyre Ash
...Show More Authors

The planning, designing, construction of excavations and foundations in soft to very soft clay soils are always difficult. They are problematic soil that caused trouble for the structures built on them because of the low shear strength, high water content, and high compressibility. This work investigates the geotechnical behavior of soft clay by using tyre ash material burnt in air. The investigation contains the following tests: physical tests, chemical tests, consolidation test, Compaction tests, shear test, California Bearing Ratio test CBR, and model tests. These tests were done on soil samples prepared from soft clay soil; tyre ash was used in four percentages (2, 4, 6, and 8%). The results of the tests were; The soil samples which

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors

Publication Date
Tue Oct 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
AUTOMATIC ARABIC KEYWORD EXTRACTION USING LOGISTIC REGRESSION
...Show More Authors

View Publication
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Forecasting enhancement using a hodrick-prescott filter
...Show More Authors

: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod

... Show More
Preview PDF
Scopus
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Ranitidine Using Chlorella Sorokiniana MH923013
...Show More Authors

The frequent and widespread use of medicines and personal care products, particularly in the residential environment, tends to raise concerns about environmental and human health impacts. On the other hand, carbon dioxide accumulation in the atmosphere is a problem with numerous environmental consequences. Microalgae are being used to bioremediate toxins and capture CO2. The current study aimed to confirm the possibility of removing pharmaceutical contaminant (Ranitidine) at different concentrations by using the Chlorella Sorokiniana MH923013 microalgae strain during the growth time. As part of the experiment, carbon dioxide was added to the culture medium three times per week. Explanatory results revealed that gas doses directly affect

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref