Preferred Language
Articles
/
jih-3303
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Visual Exciter of Theatrical Techniques in the Iraqi Theater Show: شيماء حسين طاهر
...Show More Authors

The theatrical show consists of theatrical techniques that form the space to display the play that may form conscious visual effects about the receiver. The current search included the (Research problem) which is the immediate question ((What makes the theatrical techniques dazzling and visually exciting in a certain theatrical show?))
It also included (the importance of research) by highlighting the importance of theatrical techniques and the mechanism of contrast.
It also identified the visual stimulus of theatrical techniques in the theater show.
It also included the (research limits), which were temporally determined by the period (1990-1998) and spatially, the Iraqi theater shows (Baghdad), in which theatrical techniques c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Separation of cobalt from spent catalyst CoMo by precipitation and Ion exchange techniques
...Show More Authors

Two methods were established to separate cobalt from the spent catalyst CoMo which also contain Co, Al and Fe. The first method was the precipitation technique by controlling the pH. At pH 5, 76% of the cobalt which was collected with 1.4% Al and 0.5% Fe as contaminants. The second method was the anion exchange by using Amberlite 400 resin, 100% of the cobalt and was collected with 99.46% purity.The only contaminant was Fe with 0.54% with no Al.  For a large scale production of cobalt from this spent catalyst, a batch process was designed with a production of 80 grams per batch by using the anion exchange technique. Kilograms quantities of Co were collected.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Language Teaching And Research
The Effectiveness of Role Play Techniques in Teaching Speaking for EFL College Students
...Show More Authors

The paper investigates the impact of role-playing as a classroom technique on Iraqi EFL students’ speaking skill on Iraqi EFL students at the college level. The students are 40 college language students in University of Baghdad, College of Education Ibn-Rushd randomly chosen. Then, they were divided into two groups, experimental and control groups. Thirty questions were applied to both groups as a pre-test of speaking and the students asked to answer them orally. The experimental group was taught speaking skill of the targeted role-play technique while the control group was taught in traditional method. After 20 lessons of the teaching, the post-test of speaking was conducted in which the students in both groups were asked to answ

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (25)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Directing Techniques to Process the Radio Drama Script ( Khata'a Play as a Sample)
...Show More Authors

     The radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following   ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating  to study directing techniques to process the radio drama script ( Khata'a play as a sample).

The first chapter deals with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Lubricants
Influence of Sample Mixing Techniques on Engine Oil Contamination Analysis by Infrared Spectroscopy
...Show More Authors

For the most reliable and reproducible results for calibration or general testing purposes of two immiscible liquids, such as water in engine oil, good emulsification is vital. This study explores the impact of emulsion quality on the Fourier transform infrared (FT-IR) spectroscopy calibration standards for measuring water contamination in used or in-service engine oil, in an attempt to strengthen the specific guidelines of ASTM International standards for sample preparation. By using different emulsification techniques and readily available laboratory equipment, this work is an attempt to establish the ideal sample preparation technique for reliability, repeatability, and reproducibility for FT-IR analysis while still considering t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Charge Transfer Between d-p States in Ti02 By Employing Compton Scattering Techniques
...Show More Authors

The com pton profiles for Ti02 have been measured using a SCi

Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder    having a thickness of 1.54 mm ,about J 00000  counts   have   been  accumulated   at   the  compton   peak

.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The   theoretical  and  experimental  results  ahrce  well  for (Ti/4(0 .2    arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic &nbs

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Machine Learning Techniques for Analyzing Survival Data of Breast Cancer Patients in Baghdad
...Show More Authors

The Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone

... Show More
View Publication Preview PDF
Crossref (1)
Crossref