Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Control of Non Isothermal CSTR Using Different Controller Strategies
...Show More Authors

In all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FO

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Treatment of Nasopharyngeal Carcinoma by Using Deep X-Ray Therapy
...Show More Authors

Background: Nasopharyngeal carcinoma (NPC) is one of the most challenging tumors because of their relative inaccessibility and that their spread can occur without significant symptoms with few signs, but Radiotherapy (RT) has a role in treatment of it.
Objectives: To show that RT is still the modality of choice in the treatment of NPC, to study modes of presentations, commonest histopathological types and their percentages, to show differences in the sensitivities of these types to RT and to find out a 5 year survival rate(5YSR) and its relation with lymph node involvement.
Methods: This is a retrospective study of 44 patients with NPC who were treated with routine RT from 1988-2007 at the institute of radiology and nuclear medicin

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Solving Two-Points Singular Boundary Value Problem Using Hermite Interpolation
...Show More Authors

In this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Treatment of facial acne scar using Fractional Er: YAG laser
...Show More Authors

Background: Acne is a common disorder experienced by adolescents and persists into adulthood in approximately 12%–14% of cases with psychological and social implications of high gravity. Fractional resurfacing employs a unique mechanism of action that repairs a fraction of skin at a time. The untreated healthy skin remains intact and actually aids the repair process, promoting rapid healing with only a day or two of downtime. Aims: This study, was designed to evaluate the safety and effectiveness of fractional photothermolysis (fractionated Er: YAG laser 2940nm) in treating atrophic acne scars. Methods: 7 females and 3 males with moderate to severe atrophic acne scarring were enrolled in this study that attained private clinic for Derm

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Intelligent Age Estimation From Facial Images Using Machine Learning Techniques
...Show More Authors

     Lately, a growing interest has been emerging in age estimation from face images because of the wide range of potential implementations in law enforcement, security control, and human computer interactions. Nevertheless, in spite of the advances in age estimation, it is still a challenging issue. This is due to the fact that face aging process is not only set by distinct elements, such as genetic factors, but by extrinsic factors, such as lifestyle, expressions, and environment as well. This paper applied machine learning technique to intelligent age estimation from facial images using J48 classifier on FG_NET dataset. The proposed work consists of three phases; the first phase is image preprocessing which include

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Using Machine Learning to Control Congestion in SDN: A Review
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Flotation of Chromium Ions from Simulated Wastewater Using Air Microbubbles
...Show More Authors

   A microbubble air flotation technique was used to remove chromium ions from simulated wastewater (e.g. water used for electroplating, textiles, paints and pigments, and tanning leather). Experimental parameters were investigated to analyze the flotation process and determine the removal efficiency. These parameters included the location of the sampling port from the bottom of the column, where the diffuser is located to the top of flotation column (30, 60, and 90 cm), the type of surfactant (anionic, SDS, or cationic, CTAB) and its concentration (5, 10, 15, and 20 mg/L), the pH of the initial solution (3, 5, 7, 9, and 11), the initial contaminant concentration (10, 20, 30, and 40 mg/L), the gas flow rate (0.1, 0.2, 0.3, and 0.5 L/mi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Using Resource Consumption Accounting to determine Customer Cost of Banks
...Show More Authors

The Purpose of this Research show gap between a Normal Cost System and Resource consumption Accounting Applied in AL-Rafidin Bank.

The Research explores that, how the idle capacity can be determined under resource consumption accounting, discuss the possibility of employing these energies. Research also viewed how costs can be separated into Committee and Attribute. Resource Consumption Accounting assists managers in pricing services or products based on what these services or products use from each Source.

This Research has been proven

... Show More
View Publication Preview PDF
Crossref (1)
Crossref