Preferred Language
Articles
/
jih-3303
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
(Dynamic& Static) Forecast of surplus or Deficit of Public budget in Iraq for (2017،2018)
...Show More Authors

 This research aims at forecasting the public budget of Iraq (surplus or deficit) for 2017 & 2018 through using two methods to forecast. First: forecast budget surplus or deficit by using IMF estimations average oil price per barrel adopted in the public federal budget amounted to USD 44 in 2017 & USD 46 in 2018; Second: forecast budget surplus or deficit by using MOO actual average oil price in global markets amounted to USD 66 in 2018 through applying Dynamic Model & Static Model. Then analyze the models to reach the best one. The research concluded that those estimations of dynamic forecasting model of budget surplus or deficit for 2017 & 2018 gives good reliable results for future periods when using the a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 19 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
New cost control techniques in mega construction projects
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Acting Performance in Fantasy Theatrical Show
...Show More Authors

View Publication
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Purification Techniques for Cheap Multi –Walled Carbon Nanotubes
...Show More Authors
Abstract<p>Multi-walled carbon nanotubes from cheap tubs company MWCNT-CP were purified by alcohol \ H2O2 \ separation funnel which is simple, easy and scalable techniques. The steps of purification were characterized by X-ray diffraction, Raman spectroscopy, scanning electron microscopy SEM with energy dispersive of X-ray spectroscopy EDX and surface area measurements. The technique was succeeded to remove most the trace element from MWCNT-CP which causing increase the surface area. The ratios of impurities were reduced to less 0.6% after treatment by three steps with losing less than 5% from MWCNT-CP.</p>
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2024
Journal Name
Technology In Agronomy
Harnessing automation techniques for supporting sustainability in agriculture
...Show More Authors

Automation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,

... Show More
View Publication
Crossref