Preferred Language
Articles
/
ijs-9322
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with comparable encryption time with the canonical RC4 version.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Sublimation and the New Culture in August Wilson's Fences
...Show More Authors

August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 31 2021
Journal Name
لارك
السيد الرئيس والغرانيق
...Show More Authors

  نقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين.  كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا   (1974- 1899)   يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مست

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Propose retina identification system based on the combination of SURF detector and BRISK descriptor
...Show More Authors

     In this paper the design of hybrid retina matching algorithm that is used in identification systems is considered. Retina based recognition is apparent as the most secure method for identification of an identity utilized to differentiate persons.

     The characteristics of Speeded up Robust Feature (SURF) and Binary Robust Invariant Scalable Key-Points (BRISK) algorithm have been used in order to produce a fast matching algorithm than the classical ones, those characteristics are important for real-time applications which usually need quick processing of a growing quantity of data. The algorithm is divided into three stages: retinal image processing and segmentation, extracting the lo

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
REVIEW THE ASSESSMENT OF EFFECTS OF LOST TIME INJURIES IN AN INDUSTRIAL SYSTEM BY USING AN EXPLANATORY PROGRAM
...Show More Authors

Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION: FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION
...Show More Authors

A new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Seroprevalence of CMV in Women with Bad Obstetric History in Babil/Iraq
...Show More Authors

 Placental dysfunction and or fetal central nervous system infestation caused by Human cytomegalovirus (HCMV) is the leading cause of congenital non-genetic neuro-developmental problems of the newborn, worldwide. Although the highest rates of congenital infection and CMV seroprevalence occurs in developing countries like Iraq, there remains a paucity of data from that part of the world. This descriptive case control study was undertaken in Babylon/ Iraq to determine the local seroprevalence of CMV in women of child bearing age, and to identify the socio-demographic factors associated with it.  This study found a seropositivity peak amongst the 26-35 yr olds which declined in the 36 – 45 yr olds. However, the

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Abu Izac Al-Zauali (d.616 A.H) His life and what Existed of his poetry
...Show More Authors

 

   The aim of this research is to identify the Andalusia  poet  Abu Izac Al-Zauali , whose  most of his poetry and biography had been lost, as well as many Andalusia  poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry  and to document his poetry as other  writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .

Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).

View Publication Preview PDF