Preferred Language
Articles
/
ijs-9646
Improve PGP Cryptography Protocol Using Genetic NTRU Technique
...Show More Authors

The strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomness tests) and it was used instead of the keys that generated from random movements of mouse in the standard PGP protocol. In addition, the new PGP protocol uses the NTRU technique for encryption process instead of RSA algorithm. NTRU algorithm is secure to most attack methods and performs operations much faster than RSA. So, the New-PGP increased secure condition to the PGP protocol and made it more robust and efficient.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Adaptive inter frame compression using image segmented technique
...Show More Authors

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Medical Image Segmentation using Modified Interactive Thresholding Technique
...Show More Authors

Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Brain Tumor Detection Method Using Unsupervised Classification Technique
...Show More Authors

Magnetic  Resonance  Imaging  (MRI)  is  one  of  the  most important diagnostic tool. There are many methods to segment the

tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment   the   brain   with   high   precision.   In   this   project,   the unsupervised  classification methods have been used in order to detect the tumor  disease from MRI images.    These metho

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Solar Powered Air-Conditioning Using Absorption Refrigeration Technique
...Show More Authors

The present work includes design, construction and operates of a prototype solar absorption refrigeration system, using methanol as a refrigerant to avoid any refrigerant that cause global warming and greenhouse effect. Flat plate collector was used because it’s easy, ninexpensive and efficient. Many test runs (more than 50) were carried out on the system from May to October, 2013; the main results were taken between the period of July 15, 2013 to August 15, 2013 to find the maximum C.O.P, cooling, temperature and pressure of the system. The system demonstrates a maximum generator temperature of 93.5 oC, on July 18, 2013 at 2:30 pm, and the average mean generator temperature Tgavr was 74.7 °C, for this period. The maximum pressure Pg

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Risk Assessment in BOT Contracts using AHP Technique
...Show More Authors

The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Fast Fractal Technique using Modified Moment Features on Domain Blocks
...Show More Authors

In this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected  threshold based on experience

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
USING A NEW METHOD TO INDUCE TARGETED GENETIC MUTATIONS IN POTATO VIRUS Y (PVY)
...Show More Authors

Scopus