Preferred Language
Articles
/
ijs-5952
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through the improvement of the dynamic generation of the steps for the protection of textual data security. This paper proposes a dynamic S-Box based on the user's password key (8 chars), shifting, and a 1D circle map. The results in this work indicated that the suggested approach presents a secure S-BOX, which is considered to have 255 differences identified when 1 bit of the key is changed; therefore, about 99% of the S-Box has been changed. Also, an inverse table of S-Box (16*16) is generated via the S-Box output created from the above-mentioned suggestions for returning the values regarding the union of the column and the row for all the S-Box generated values. We examine the quality of our S-Box through various well-known performance parameters. All of the analysis yields very encouraging results, certifying that the generated S-box meets all criteria that are required for reliable and secure encryption. Just a few milliseconds are needed to implement it.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating the Clinical Outcomes of Three Medication Regimens for Treating a Sample of Iraqi Persistent Asthmatic patients
...Show More Authors

Abstract

    Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma. 

    This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Diversity of Heamatogenetic Markers in Kirkuk Population
...Show More Authors

  Immuno-haematological genetic markers study was carried out to understand the genetic background variations among Kirkuk (Iraq) indigenous population. A cross-sectional study of 179 patients with thalassemia major was conducted in Kirkuk. A detailed review was undertaken to define the relationships between ethnic origins, phenotype and immuno-genetic markers uniformity in relation to genetic isolation and interethnic admixture. A total of 179 thalassemia major patients were subjected to analysis in the hereditary blood diseases centre, including (18(10.05 %)) of intermarriages between different ethnic groups origin, whereas the overall consanguinity marriage rate was estimated at (161 (89.9%)) including (63(35.1%)) for first cousi

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
American strategic performance towards Middle East in the era of president Trump - A future study
...Show More Authors

Abstract The strategic performance of the United States depends on dealing with the Middle East countries and its variants on several bases and motives that enabled them to achieve American hegemony and invest its interests at the expense of the region countries. Within this performance, the administration of the United State President Donald Trump presented the Strategic Document on December 18, 2017, which focused on the principle of "America First", to determine the direction of future US strategic performance in the formulation of means of cooperation and intersections or hostility in addition to interests and threats.The future vision of the Arab region and the Middle East as a whole, this strategy is based on the fact that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Elastic Electron Scattering form Factors for Odd-A 2s-1d Shell Nuclei
...Show More Authors

The charge density distributions (CDD) and the elastic electron scattering form
factors F(q) of the ground state for some odd mass nuclei in the 2s 1d shell, such
as K Mg Al Si 19 25 27 29 , , , and P 31
have been calculated based on the use of
occupation numbers of the states and the single particle wave functions of the
harmonic oscillator potential with size parameters chosen to reproduce the observed
root mean square charge radii for all considered nuclei. It is found that introducing
additional parameters, namely; 1  , and , 2  which reflect the difference of the
occupation numbers of the states from the prediction of the simple shell model leads
to very good agreement between the calculated an

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Elastic Electron Scattering form Factors for Odd-A 2s-1d Shell Nuclei
...Show More Authors

The charge density distributions (CDD) and the elastic electron scattering form
factors F(q) of the ground state for some odd mass nuclei in the 2s 1d shell, such
as K Mg Al Si 19 25 27 29 , , , and P 31
have been calculated based on the use of
occupation numbers of the states and the single particle wave functions of the
harmonic oscillator potential with size parameters chosen to reproduce the observed
root mean square charge radii for all considered nuclei. It is found that introducing
additional parameters, namely; 1  , and , 2  which reflect the difference of the
occupation numbers of the states from the prediction of the simple shell model leads
to very good agreement between the calculated an

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
College Of Islamic Sciences
Linguistic deposits in the Arabic language
...Show More Authors

 

Abstract of the research:

     This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that  It should be undertaken and studied by researchers;  Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic.  In the

... Show More
View Publication Preview PDF
Publication Date
Wed May 11 2022
Journal Name
مجلة معارف للعلوم القانونية والاقتصادية
التصرفات القانونية الواردة على الجزء المفرز( الشقة ) في نظام الاسكان العمودي
...Show More Authors

الملخص ان حق الملكية هو الحق الاوسع نطاقا يمنح صاحبه صلاحية ممارسة السلطات كافة ويكون محل هذه السلطات كل ما يملك الشخص سواء كان شقه او طبقة اسوة بالعقارات الاخرى كدار للسكن او ارض ، ومن اهم هذه السلطات واوسعها نطاقا ( هو سلطة التصرف ). تعد هذه السلطة جوهر حق الملكية وأخطر السلطات الممنوحة للمالك كونه بواسطتها يمكنه الاستغناء عن ملكه بأي تصرف ناقل له كالبيع أو الهبة او الوصية مثلا ، ولأهمية هذه السلط

... Show More
View Publication Preview PDF