Preferred Language
Articles
/
ijs-7360
A Secured End to End Voice Transmission in Smartphone
...Show More Authors

The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified RC4. The performance of the proposed E2ESeVoice application is evaluated in terms of Mean Opinion Score (MOS) and computation time. The MOS score of E2ESeVoice application is measured with encrypted and unencrypted calls and resulted in values of 4.25 (Good) and 4 (Good) respectively. The result shows that the MOS of both tests is comparable and the encryption has not affect the quality of voice.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Determination of Atenolol in pharmaceutical formulations by continuous flow injection analysis via turbidimetric (T180o) and scattered light effect at two opposite position (2N90o ) using Ayah 4SW-3D-T180 -2N90 -Solar - CFI
...Show More Authors

A simple, rapid and sensitive method for the analysis of Atenolol in pure and pharmaceutical preparation as an alternative analytical procedure were developed by continuous flow injection analysis via turbidimetric (T180o) and scattered light effect at two opposite position (2N90o). The method is based upon the formation of white precipitate for the ion pair compound by phosphomolybidic acid with Atenolol in aqueous medium. The precipitate is measured via the attenuation of incident light and scattering of the incident light in two opposite direction namely +90o and -90o angle were measured. Chemical and physical parameters were investigated. The linearity of Atenolol is ranged from (0.1-11) mmol.L-1, with correlation coefficient r=0.993

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Molecular Modeling
Ab initio study of structural, mechanical and electronic properties of 3d transitional metal carbide in cubic rocksalt (rs), zincblende (zb), and cesium chloride (cc) structures by using LDA and GGA Approximation
...Show More Authors

This study rigorously investigates three 3d transition metal carbide (TMC) structures via LDA and GGA approximations. It examines cohesive energy (Ecoh), Vickers hardness (Hv), mechanical stability, and electronic properties. Notably, most 3d TMCs exhibit higher cohesive energy than nitrides, and rs-TiC demonstrates a Vickers hardness of 25.66 GPa, outperforming its nitride counterpart. The study employs theoretical calculations to expedite research, revealing mechanical stability in CrC and MnC (GGA) and CrC (LDA in cc structure), while all 3d TMCs in rs and seven in zb structures show stability. Charge transfer and bonding analysis reveal enhanced covalency along the series, influenced by the interplay between p orbitals of carbon and d o

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables
...Show More Authors

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of cavity design for cusp coverage on fracture strength of weakened maxillary first premolars using two esthetic restorative systems (CAD/CAM hybrid ceramic and nanohybrid composite) (An in vitro study)
...Show More Authors

Background: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Extraction, Identification and Isolation of B-sitosterol from Iraqi Wild Awsaj plant (Lycium barbarum) Using UAE (Probe and Bath) and two isolation technique (HPTLC and PHPLC): B-sitosterol in Iraqi Awsaj plant
...Show More Authors

Awsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Diyala Agricultural Sciences Journal (dasj)
(OLIGO-X) the effect of salinity of irrigation water and magnetisation and soaking Alalascorbek acid and extracted sea Your protected agriculture. DALIA in germination and growth of seedlings seeds of hybrid option
...Show More Authors

Publication Date
Thu Jan 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Plasma Treatment on Shear Bond Strength of High Impact Acrylic Resin Denture Base Lined with Two Types of Soft Lining Materials after Immersion in Distilled Water and Denture Cleanser
...Show More Authors

Background: In dentistry, dentist takes the advantages of soft lining materials due to the viscoelastic properties. The major problem is the adhesion of the soft liner with the denture base material. Materials and Methods: Heat cured of high impact acrylic resin specimens prepared with dimensions 75x13x13mm for shear bond strength test, soft lining material (Refit and Mollosil) with a 3-mm thickness and used to join each two acrylic blocks. Also four specimens with the same previous dimensions utilized for chemical and physical surface analysis. The specimens grouped as control (without plasma) and experiment (with oxygen plasma) treated high impact acrylic specimens. Results: Plasma treatment increased the shear bond strength for both Refi

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2024
Journal Name
Journal Of Legal Sciences
The period for challenging the unconstitutionality of the medium-term general budget law In light of the decision of the Federal Supreme Court No. 155 and its unified No. 163 / Federal / 2022
...Show More Authors

يتعرض قانون الموازنة العامة الاتحادية للطعن بعدم الدستورية كغيره من القوانين، بل أن الطعن فيه يكاد يكون سنوياً حال نشره في الجريدة الرسمية ، وتوجه إليه المطاعن بعدم الدستورية إما عن إجراءات تشريعه أو لمضامينه المتعارضة مع الدستور نصاً أو روحاً ، ولكنّه إذا كانت مدة الطعن بعدم دستورية القوانين كافة متاحة دون قيد زمني محدد ولا تتطلب سوى إجراءات إقامة الدعوى العامة وأخصها قيام شرط المصلحة في حالة الدعوى ال

... Show More
Crossref