Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
On Г-n- (Anti ) Generalized Strong Commutativity Preserving Maps for Semiprime Γ-Rings
...Show More Authors

      In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps  such that  is onto,  satisfy one of the following conditions  belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R   belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP)  Then there exists an element  and  additive maps  such that  is of the form  and   when condition (i) is satisfied, and     when condition (ii) is satisfied   

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Limits between the Cosmological Parameters from Strong Lensing Observations for Generalized Isothermal Models
...Show More Authors

This paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
5th International Conference On Energy Aware Computing Systems & Applications
Area efficient test circuit for library standard cell qualification
...Show More Authors

High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.

View Publication
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximation Solution of Fuzzy Singular Volterra Integral Equation by Non-Polynomial Spline
...Show More Authors

A non-polynomial spline (NPS) is an approximation method that relies on the triangular and polynomial parts, so the method has infinite derivatives of the triangular part of the NPS to compensate for the loss of smoothness inherited by the polynomial. In this paper, we propose polynomial-free linear and quadratic spline types to solve fuzzy Volterra integral equations (FVIE) of the 2nd kind with the weakly singular kernel (FVIEWSK) and Abel's type kernel. The linear type algorithm gives four parameters to form a linear spline. In comparison, the quadratic type algorithm gives five parameters to create a quadratic spline, which is more of a credit for the exact solution. These algorithms process kernel singularities with a simple techniqu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Practicing Citizenship Values by Bisha University Students
...Show More Authors

 

Abstract

 

The study aims to identify the degree of citizenship values practiced by Bisha University students and identify the impact of gender, college, and academic level, on the degree of the practice of University students for citizenship values. The researcher used the descriptive-analytical method including a questionnaire of (44) items. To process the data, the researcher applied the computational averages, standard deviations, percentages, and T-test. The questionnaire was implemented on a sample of (600) of the 2 and 8 levels during the second semester of the academic year (2020-2019) at Bisha University. The study findings revealed that the degree of the pra

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Frustration degree and guilt among drug addicts harmful to themselves
...Show More Authors

This study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug,  and to know the addicts perspective  who are in treatment clinics and rehabilitation centers  in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for  this  study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers  in Palestine and analyze their  responses  in light of some of the variables.

The study results showed that drug addicts who ar

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Recognizing Job Apathy Patterns of Iraqi Higher Education Employees Using Data Mining Techniques
...Show More Authors

Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus