Preferred Language
Articles
/
jih-2120
Proposed A Permutation and Substitution Methods of Serpent Block Cipher

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block cipher algorithm

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological social conflict and its relation with family parental style for adolescences from the intermediate stage student at governmental Hail school, in the light of economical levels and sex variables .KSA

The current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Fast 128-bit Multi-Pass Stream Ciphering Method

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Sep 17 2021
Journal Name
Canadian Journal Of Physics
Synthesis, characterization, photoluminescence, and antibacterial activities of silica-graphene oxide composites

In this research, a novel thin film Si-GO10 and nanopowders Si-GO30 of silica-graphene oxide (GO) composite were prepared via the sol–gel method and deposited on glass substrates using spray pyrolysis. X-ray diffraction (XRD) results showed a relatively strong peak in the graphite layer that corresponds to the (002) plane. Transmission electron microscope (TEM) images showed that SiO2 nanoparticles were randomly distributed on the surface of GO plates, and the particle size in these nanopowders was below 50 nm. Field emission scanning electron microscopy (FESEM) analysis demonstrated that silica nanoparticles on the surface of GO plates exhibited almost spherical and rod-like nanoparticle shape, which in turn confirmed the formation of Si

... Show More
Preview PDF
Publication Date
Tue May 01 2018
Journal Name
2018 2nd Ieee Advanced Information Management,communicates,electronic And Automation Control Conference (imcec)
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Fri Sep 18 2020
Journal Name
Hal Open Science
Adaptive Approximation Control of Robotic Manipulators: Centralized and Decentralized Control Algorithms

The regressor-based adaptive control is useful for controlling robotic systems with uncertain parameters but with known structure of robot dynamics. Unmodeled dynamics could lead to instability problems unless modification of control law is used. In addition, exact calculation of regressor for robots with more than 6 degrees of freedom is hard to be calculated, and the task could be more complex for robots. Whereas the adaptive approximation control is a powerful tool for controlling robotic systems with unmodeled dynamics. The local (partitioned) approximation-based adaptive control includes representation of the uncertain matrices and vectors in the robot model as finite combinations of basis functions. Update laws for the weighting matri

... Show More
View Publication
Publication Date
Mon Feb 01 2021
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Topology of cubic bipolar structures and its application on Q-algebra

In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.

Publication Date
Wed Jan 01 2020
Journal Name
Thin Solid Films
Physico-chemical properties of CrMoN coatings-combined experimental and computational studies

n this study, Cr−Mo−N thin films with different Mo contents were synthesised via closed field unbalanced magnetron sputtering ion plating. The effects of Mo content on the microstructure, chemical bonding state, and optical properties of the prepared films were investigated by X-ray diffraction spectroscopy (XRD), X-ray photoelectron spectroscopy (XPS), field emission scanning electron microscopy, and ultraviolet-visible spectrophotometry. XRD results determined the face centered cubic (fcc) structure of pure CrN film. The incorporation of molybdenum (Mo) in the CrN matrix was confirmed by both XRD and XPS analyses. The CrMoN coatings demonstrate various polycrystalline phases including CrN, γ-Mo2N, Cr with oxides layers of MoO3, CrO3,

... Show More
Publication Date
Wed Jan 16 2013
Journal Name
No Journal
Synthesis and Characterisation of Metal Complexes with Mixed Azido-Carboxylato Bridges

The research on coordination polymers chemistry based on organic-metal framework with bridging ligands has accelerated during the past two decades. It is an interested hot topic in the synthetic inorganic chemistry, which allowed the fabrication of a variety of interested materials. These materials have shown a range of applications including light harvesting and magnetic properties. The thesis is divided in three chapters. The first chapter gives a general introduction on the development of self-assembled polymeric species based on transition metal. It is also covered a summary of the literature review on the current state of the art on self-assembled coordination ploymers. Furthermore, it includes a description on various relevant topics

... Show More