Preferred Language
Articles
/
ijs-5805
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of security to Triple Data Encryption Standard algorithm using Nth Degree Truncated Polynomial Ring Unit algorithm. This aim achieved by adding two new key functions, the first one is Enckey(), and the second one is Deckey() for encryption and decryption key of Triple Data Encryption Standard to make this algorithm more stronger. The obtained results of this paper also have good resistance against brute-force attack which makes the system more effective by applying Nth Degree Truncated Polynomial Ring Unit algorithm to encrypt and decrypt key of Triple Data Encryption Standard. Also, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Weight loss program outcome of obese attending AL-Kindy obesity research and therapy unit
...Show More Authors

Background: overweight and obesity are the fifth leadingrisk for global deaths. At least 2.8 million adults die eachyear as a result of being overweight or obese. Numerousstudies show that weight loss, even if only 5-10%,significantly improves dyslipidemia, hypertension, diabetesmellitus, risk for osteoarthritis and its symptoms and risk forselected cancers.Objectives: is to evaluate the effect of diet and exerciseprogram on anthropometric and biochemical status of adultobese patients.Methods: descriptive study. 124 adult obese patientsattending Al Kindy obesity research and therapy unit duringDecember 2012 were included. Measurement of Wt, heightHt and WC performed and BMI was calculated. Laboratorytest analysis, on the fasting state, w

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 11 2024
Journal Name
Lecture Notes In Networks And Systems
International Financial Reporting Standards and Their Impact on the Value of the Economic Unit
...Show More Authors

This study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
TWO-PARAMETER GAMMA DISTRIBUTION AND LOG NORMAL DISTRIBUTION FOR DERIVATION OF SYNTHETIC UNIT HYDROGRAPH
...Show More Authors

Most available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Safety Science
Perceived management commitment and psychological empowerment: A study of intensive care unit nurses’ safety
...Show More Authors

View Publication
Scopus (42)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
An Approximate Solution of the Space Fractional-Order Heat Equation by the Non-Polynomial Spline Functions
...Show More Authors

     The linear non-polynomial spline is used here to solve the fractional partial differential equation (FPDE). The fractional derivatives are described in the Caputo sense. The tensor products are given for extending the one-dimensional linear non-polynomial spline to a two-dimensional spline  to solve the heat equation. In this paper, the convergence theorem of the method used to the exact solution is proved and the numerical examples show the validity of the method. All computations are implemented by Mathcad15.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
New mode for the on-line determination of oxonium ion in different strong acids using CFIA via the use of homemade linear array Ayah 5Sx4-ST- 5D solar CFI analyser
...Show More Authors

New mode for the on-line determination of oxonium ion in different strong acids using CFIA via the use of homemade linear array Ayah 5Sx4-ST- 5D solar CFI analyser

View Publication Preview PDF
Publication Date
Sat Oct 08 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Data Analytics and Techniques
...Show More Authors

Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide

... Show More
View Publication
Crossref (5)
Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF