Preferred Language
Articles
/
ijs-7815
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry of the fifth scientific students
...Show More Authors

The research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Communication Networks And Distributed Systems
A novel Radon-based multi-carrier direct sequence code division multiple access transceiver design and simulation
...Show More Authors

Multi-carrier direct sequence code division multiple access (MC-DS-CDMA) has emerged recently as a promising candidate for the next generation broadband mobile networks. Multipath fading channels have a severe effect on the performance of wireless communication systems even those systems that exhibit efficient bandwidth, like orthogonal frequency division multiplexing (OFDM) and MC-DS-CDMA; there is always a need for developments in the realisation of these systems as well as efficient channel estimation and equalisation methods to enable these systems to reach their maximum performance. A novel MC-DS-CDMA transceiver based on the Radon-based OFDM, which was recently proposed as a new technique in the realisation of OFDM systems, will be us

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Numerical Simulation of Metasurface Grating to Function as Polarization Modulator in Quantum Key Distribution Systems
...Show More Authors

larization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface

... Show More
Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Numerical Simulation of Metasurface Grating to Function as Polarization Modulator in Quantum Key Distribution Systems
...Show More Authors

Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarize

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 12 2022
Journal Name
Electronics
TWGH: A Tripartite Whale–Gray Wolf–Harmony Algorithm to Minimize Combinatorial Test Suite Problem
...Show More Authors

Today’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Synthesis of New Oxopyrimidine and Cyanopyridine Derivatives Containing the Pyrimidine Benzothiazole Moiety with the Evaluating their Colon Anticancer Bioactivity
...Show More Authors

     In this contribution, new derivatives of bicyclic fused rings with bridgehead nitrogen of 3-substituted imidazo/pyrimidine derivatives A1-A3 were synthesized by reacting 2-aminobenzothiazol, acetyl acetone, and different substituted aldehydes in a one-pot reaction. These compounds A1-A3 were then condensed with 4-bromobenzaldehyde and 4-(N,N-dimethylamino)benzaldehyde to form new chalcone derivatives A4-A9. Ring closure of these compounds A4-A9 with urea and malononitrile afforded new oxopyrimidine derivatives A10-A15 and cyanopyridine derivatives A16-A21, respectively. These compounds were characterized by FT-IR, 1H NMR, and 13C NMR spectroscopy. The second part of this work included some of the i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 27 2019
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
TWO NEW RECORDS OF THE GENUS APHODIUS ILLIGE, 1798 (COLEOPTERA: APHODIIDAE) IN IRAQTWO NEW RECORDS OF THE GENUS APHODIUS ILLIGE, 1798 (COLEOPTERA: APHODIIDAE) IN IRAQ
...Show More Authors

    In this study, the dung beetles Aphodius (Bodilus) ictericus (Laicharting, 1781) and Aphodius (Planolinellus) vittatus Say, 1825 which belongs to the family of Aphodiidae (Order: Coleoptera) are redscribed here as to being found for the first time in Iraq.

 

    The specimens were collected from different regions in the middle of Iraq; the main diagnostic characters and some morphological features of males were drawn and pictured.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref