Preferred Language
Articles
/
jih-2655
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However, the key generation process in our scheme has been done without any intervention from the certificate issuer and avoiding the risk of compromised CA. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been used with the ECDH to handle the authentication of the key exchange. The proposed scheme is demonstrated on a big dataset of social networks. The scheme is analyzed based on security criteria that have been compared with the previous schemes to evaluate its performance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Improved Alternating Direction Implicit Method
...Show More Authors
Abstract<p>The alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jul 14 2023
Journal Name
International Journal Of Information Technology &amp; Decision Making
A Decision Modeling Approach for Data Acquisition Systems of the Vehicle Industry Based on Interval-Valued Linear Diophantine Fuzzy Set
...Show More Authors

Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling of The Effect of Grain Size and La2O3 Doping on Sintering α – Cristobilite
...Show More Authors

   In this research the effect of grain size and effect of La2O3 doping on densification  rate for the  initial and intermediate  stages of sintering were studied .The experimental results for α – cristobilite powder are modeled using ( L2-Regression ) technique in studying  the effect of grain size and La2O3 doping using  three particles size (6.12, 8.92, 13.6 ) µm, with undoped  initial powder and with La2O3 doping . The mathematical simulation showes that the densification rates increase as the initial particles sizes decrease and vice versa. This shows that the densification depends directly on the initial compact density which reflects the contacts area between the particles . How

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Form and content encryption with digital designs in women's contemporary fabrics: زينب عبد علي محسن الزبيدي
...Show More Authors

My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Study of Steroidal Sapogenin “Tigogenin” Present in the Leaves of Yucca aloifolia Cultivated in Iraq
...Show More Authors

This study detects the presence of the most important steroidal sapogenin “Tigogenin” in the leaves of Yucca aloifolia widely cultivated in Iraq. The absence of any study concerning the Tigogenin content of this medicinal plant in Iraq, and the industrial importance of Tigogenin depending on its role as a precursor in the synthesis of some steroidal drugs, acquired this study its value. This study concerned with extraction, identification, isolation, and purification of Tigogenin from the leaves of Yucca aloifolia. Extraction of this compound was carried out using two methods. Identification of this compound was done using thin layer chromatography (TLC) where different solvent systems had been tried. Liberm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Study of Steroidal Sapogenin “Tigogenin” Present in the Leaves of Agave americana Cultivated in Iraq
...Show More Authors

The presence of the most important steroidal sapogenin “Tigogenin” in the leaves of Agave americana  cultivated in Iraq was detected. The absence of any study concerning the Tigogenin content of this medicinal plant in Iraq, and the industrial importance of Tigogenin depending on its role as a precursor in the synthesis of some steroidal drugs, acquired this study its value. This search include extraction,  isolation,  purification and dentification of Tigogenin from the leaves of Agave americana. Extraction of this compound was carried out using two methods. Identification of this compound is carried out by using thin layer chromatography (TLC) where three different mobile phase have been use

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors