Preferred Language
Articles
/
ijs-9589
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Computer Science
Dropping down the Maximum Item Set: Improving the Stylometric Authorship Attribution Algorithm in the Text Mining for Authorship Investigation
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Estimation of (S-S) reliability for inverted exponential distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Promising Gains of 5G Networks with Enhancing Energy Efficiency Using Improved Linear Precoding Schemes
...Show More Authors

Scopus (2)
Scopus Crossref
Publication Date
Wed Jul 16 2025
Journal Name
Tikrit Journal Of Pure Science
Spectrophotometric Determination of Aluminum Using Alizarin Red S-Application to Pharmaceutical Preparations
...Show More Authors

View Publication
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
⊕-s-extending modules
...Show More Authors

     The -s-extending modules will be purpose of this paper, a module M  is -s-extending if each submodule in M is essential in submodule has a supplement that is direct summand. Initially, we give relation between this concept with weakly supplement extending modules and -supplemented modules. In fact, we gives the following implications:

Lifting modules   -supplemented modules   -s-extending modules  weakly supplement extending modules.

It is also we give examples show that, the converse of this result is not true. Moreover, we study when the converse of this result is true.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Using the Box Jenkins models to predict Iraq's cement production and to demonstrate its adequacy under future construction projects
...Show More Authors

تعد صناعة السمنت في العراق من اقدم الصناعات الحديثة واكثرها تطورا وتقدما ومن اقواها تاثيرا في الاقتصاد القومي. واذ توفر في صناعة السمنت العراقي كافة المستلزمات الناجحة من حيث توفر المواد الاولية والخبرات الفنية والتقنية واسواق ثابتة وراسخة محليا وعالميا فقد كان من المفروض ان يتم التوسع في هذه الصناعة، وان التخطيط لهذه الصناعة امرا ضروريا خاصة وان مادة السمنت هي احدى اهم المواد الرئيسة التي يؤثر توفره

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
A Real-Coded Genetic Algorithm with System Reduction and Restoration for Rapid and Reliable Power Flow Solution of Power Systems
...Show More Authors

The paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Surgical Neurology International
Unilateral absence of the internal carotid artery associated with anterior communicating artery aneurysms: Systematic review and a proposed management algorithm
...Show More Authors
Background:

Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref