Preferred Language
Articles
/
ijs-9589
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Int. J. Agricult. Stat. Sci. V
The role of irrigation management processes and micronutrient fertilization on parameter of growth and yield of two wheat varieties
...Show More Authors

The experiment was conducted in Al- Mahaweel Research Station in Babel Governorate, Ministry of Agriculture during autumn season 2016-2017 to determine the role of irrigation management processes and micronutrient fertilization in growth and productivity of two varieties of wheat IPA 99 and Al-Rasheed 22 in clay loam soil classified as Typic Torriflovent. The experiment included four irrigation treatments and six fertilization treatments. The experiment was designed under randomized complete block design (RCBD) with three replications. Wheat grain IPA 99 and Al-Rasheed 22 varieties were planted in 23/11/2016 and harvested in 13/5/2017. The amount and periods of irrigation depended on sensors reading of volumetric water content was measured

... Show More
Preview PDF
Scopus (5)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Block Method for SolvingState-Space Equations of Linear Continuous-Time Control Systems
...Show More Authors

This paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Changing the Trends in Surgery during the COVID-19 Times: An Experience from the Eastern Uttar Pradesh State, India: CHANGING TRENDS IN SURGERY DURING COVID TIMES
...Show More Authors

Background: The COVID-19 pandemic has an immense effect not only on the social and economic lives of people but also on the surgical lives of surgeons, residents, nursing staff, and patients as well as ground level staff. Amidst this COVID pandemic, emergency surgeries were being done but at a decreased rate, whereas elective cases depended on the will of hospitals, surgeons, and patients. Study aims to promulgate a "Neo–Surgical Check Box" by amalgamating the WHO surgical checklist and the results obtained from the questionnaires.

Subjects and Methods: After receiving ethical clearance from the Institute Ethical Committee, an online questionnaire with 50 questions divided into

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Modern trends in the architecture of mosques in Jordan
...Show More Authors

This study analyzes the features of historical and modern mosques in Jordan compared to that of Amman. The architecture of the Jordanian mosques reflects the images of great ancient empires and kingdoms of Europe and the Middle East. This has happened due to the geographical position of the country. From the studies of historians and archaeologists, comparative analysis of planning solutions, the use of plastics and decor of the facades of mosques, and the literature on the construction methods of the mosques allow us to conclude that age-old traditions have been preserved through the establishment of mosques in both the countries. Besides, the emergence of new features in constructing mosques has been observed. We find the influence of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Effect of Lactobacilli sources on Escherichia coli and Staphylococcus aureus adherence to uroepithelial cells
...Show More Authors

The inhibitory action of four lactobacilli isolates Lactobacillus bulgaricus, L. acidophilus, L. plantarum and L. fermentum, isolated from four different samples; yoghurt, vinegar, saliva and vagina respectively, on Escherichia coli and Staphylococcus aureus adhesion to uroepithelial cells were investigated. Results showed that all Lactobacillus isolates or their supernatant were able to reduce the number of the uropathogens attached to uroepithelial cells. However, inhibition level of lactobacilli cells was higher than their supernatant. Nevertheless, the human indigenous lactobacilli (L. fermentum and L. plantarum) were more competitive than food lactobacilli (L. acidophilus and L. bulgaricus).

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Synthesis and optical properties of CdS quantum dots via paraffin liquid and oleic acid
...Show More Authors

In this study, an easy, low-cost, green, and environmentally
friendlier reagents have been used to prepare CdS QDs, in chemical
reaction method by mixed different ratio of CdO and sulfur in
paraffin liquid as solvent and oleic acid as the reacting media in
different concentration to get the optimum condition of the reaction
to formation CdS QDs. The results give an indication that the
behavior is at small concentration of 4ml of the oleic acid is best
concentration which give CdS QDs of small about to 9.23 nm with
nano fiber configuration.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref