Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools
...Show More Authors

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Geomatics correction model for GPS data using RTK-DGPS survey
...Show More Authors

Determination of the sites of geographical coordinates with high accuracy and in short time is very important in many applications, including: air and sea navigation, and in the uses geodetic surveys. Today, the Global Positioning System (GPS) plays an important role in performing this task. The datum used for GPS positioning is called World Geodetic System 1984 (WGS84). It consists of a three-dimensional Cartesian coordinate system and an associated ellipsoid so that WGS84 positions describe coordinates as latitude, longitude and ellipsoid height (h) coordinates, with respect to the center of mass of the Earth This study develops a mathematical model for geomantic measurement correction for ellipsoidal heights (h) between two different

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis of New Some Imidazole Derivatives Containing ?-Lactam Ring
...Show More Authors

In this work 5-methylene-yl - (2-methy –oxazole-4-one) (1H) imidazole (1) were synthesized from the reaction of L-Histidine with acetic anhydride and which converted to the of 5-methylene-yl-(2-methyl 3-amino imidazole-4-one)-1H-imidazole (2) by reaction with hydrazine hydrate. Schiff bases (3-6) were synthesized from the reaction of compound (2) with different aromatic aldehyde. Reaction of compounds (3-6) with chloroacetyl chloride gives azetidinone one derivatives (7-10). These compounds were characterized by FT-IR and some of them with 1H-NMR and 13C-NMR spectroscopy.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
A topology on a ring part of is-algebra
...Show More Authors

Scopus (1)
Scopus Clarivate
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Fuzzy σ-Ring  and Some Related Concepts
...Show More Authors

This paper introduces the concept of fuzzy σ-ring as a generalization of fuzzy σ-algebra and basic properties; examples of this concept have been given.  As the first result, it has been proved that every  σ-algebra over a fuzzy set x*  is a  fuzzy σ-ring-over a fuzzy set x*  and construct their converse by example. Furthermore, the fuzzy ring  concept has been studied to generalize fuzzy algebra and its relation. Investigating  that the concept of fuzzy  σ-Ring is a stronger form of a fuzzy ring  that is every fuzzy σ-Ring over a fuzzy set x* is a fuzzy ring over a fuzzy set x* and construct their converse by example. In addition, the idea of the smallest, as an important property in the study of real analysis, is studied

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of Some Amides Containing Isoxazoline Ring
...Show More Authors

This work involves synthesis of amides containing isoxazoline unit starting with
chalcone; 4-[3-(3‾-nitrophenyl)-2-propene- 1-one]-aniline[I]. 4-Aminoacetophenone was
reacted with 3-nitrobenzaldehyde in basic medium giving chalcone [I] by claisen-schemidt
reaction. The chalcone [I] was reacted with hydroxylamine hydrochloride giving isoxazoline
[II] in NaOH basic medium. The amides with structural formula [III]a-h were prepared by the
reaction of amino compounds ; isoxazoline [II] with different acid chlorides in dry pyridine
and using DMF as a solvent at 4
0
C. All the synthesized compounds have been characterized
by melting points , FTIR and
1
HMNR (of compound [III]a) spectroscopy.

View Publication Preview PDF