Preferred Language
Articles
/
jih-2655
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However, the key generation process in our scheme has been done without any intervention from the certificate issuer and avoiding the risk of compromised CA. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been used with the ECDH to handle the authentication of the key exchange. The proposed scheme is demonstrated on a big dataset of social networks. The scheme is analyzed based on security criteria that have been compared with the previous schemes to evaluate its performance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Silica Sio2 on the Dielectric and Physical Properties of Mn –Ni Ferrite
...Show More Authors

The effect of SiO 2 ) Silica) on the dielectric and physical properties of Mnx-Ni1 -xFe2O4 ،، X=0.5 is studies. The samples are prepared by the conventional manufacturing
method. We found that the physical and dielectric properties of Mn-Ni ferrite change
considerably with the substituent samples .the variation of dielectric constant as a function of
frequency of ferrite system decrease with frequency increases and increase with the increase
the concentration of SiO 2 . It was found that the increase of SiO 2 concentration of all our
samples produce an increase in mass density and decrease with porosities

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Fri Jan 01 2010
Journal Name
Conference Proceedings
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus (19)
Scopus
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Skin Detection using Improved ID3 Algorithm
...Show More Authors

Skin detection is classification the pixels of the image into two types of pixels skin and non-skin. Whereas, skin color affected by many issues like various races of people, various ages of people gender type. Some previous researchers attempted to solve these issues by applying a threshold that depends on certain ranges of skin colors. Despite, it is fast and simple implementation, it does not give a high detection for distinguishing all colors of the skin of people. In this paper suggests improved ID3 (Iterative Dichotomiser) to enhance the performance of skin detection. Three color spaces have been used a dataset of RGB obtained from machine learning repository, the University of California Irvine (UCI), RGB color space, HSV color sp

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Evaluation of the Pollution Elements at Samara Water Table – Iraq
...Show More Authors

Underground water is extracted by wells that are connected through underground canals. Thus, the levels of pollutant elements in ground water could be evaluated directly from water samples collected from the wells. This study was conducted in the city of Samara / Salah-Aldeen province – Iraq. The samples were taken from 29
wells within the study area for the period 2012-2014 with a supervision from the General Authority for Groundwater / the Iraqi Ministry of Water Resources. GIS technology was adopted to calculate the pollution elements at Samara water table. The concentrations of chemical elements [K, Na, Mg, Cl, Ca] and compounds [SO4, HCO3] were manipulated and calculated for the entire area. The results of laboratory analy

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Improved optimality checkpoint for decision making by using the sub-triangular form
...Show More Authors

Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
mRNA Approach Image Encryption Using LUC Algorithm
...Show More Authors

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref