Preferred Language
Articles
/
ijs-8117
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.

Scopus Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Low Energy Consumption Scheme Based on PEGASIS Protocol in WSNs
...Show More Authors

Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Satellite Images Classification in Rural Areas Based on Fractal Dimension
...Show More Authors

Fractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 08 2025
Journal Name
Al–bahith Al–a'alami
Information Pollution in Iraqi Journalism…Study in Causes and Sources - A research drawn from a Master Degree thesis
...Show More Authors

Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Materials Science In Semiconductor Processing
Rational design of novel 0D/0D Bi2Sn2O7/CeO2 in the core-shell nanostructure for boosting the photocatalytic decomposition of antibiotics in wastewater: S-type-based mechanism
...Show More Authors

View Publication
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Focus of The Science Curriculum for the First Intermediate Grade on National, Health, Environmental And Economic Values in Light of the Education Policy in The Kingdom of Saudi Arabia and a Suggested Scenario for a Mechanism to Be Strengthe
...Show More Authors

The study aimed to reveal the extent of the first intermediate grade science curriculum focus on the national values, health, environmental, economic values, in the light of the education policy in the Kingdom of Saudi Arabia, in addition to present a proposed vision to strengthen it in the science curriculum for the first intermediate grade. The study was applied to the two books student and the two books of activity on the first-second semesters for the academic year 1441 AH. To analyze the curriculum content, the study used a verified card prepared by the researchers and a criterion for interpreting percentages. The study reached the following results: environmental values ranked first with a concentration of (43%), i.e. with an avera

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Ieee Xplore
The Internet of Everything Based Smart Systems: Applications and Challenges
...Show More Authors

Smart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology

... Show More
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Enhanced Cartooning System Based on Dynamic Augmented KMCG and LIP
...Show More Authors

The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.

View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
Hand Written Signature Verification based on Geometric and Grid Features
...Show More Authors

The fact that the signature is widely used as a means of personal verification
emphasizes the need for an automatic verification system. Verification can be
performed either Offline or Online based on the application. Offline systems work on
the scanned image of a signature. In this paper an Offline Verification of handwritten
signatures which use set of simple shape based geometric features. The features used
are Mean, Occupancy Ratio, Normalized Area, Center of Gravity, Pixel density,
Standard Deviation and the Density Ratio. Before extracting the features,
preprocessing of a scanned image is necessary to isolate the signature part and to
remove any spurious noise present. Features Extracted for whole signature

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref