Preferred Language
Articles
/
jih-711
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Frontiers In Microbiology
Removal of mobile genetic elements from the genome of Clostridioides difficile and the implications for the organism’s biology
...Show More Authors

Clostridioides difficile is an emerging pathogen of One Health significance. Its highly variable genome contains mobile genetic elements (MGEs) such as transposons and prophages that influence its biology. Systematic deletion of each genetic element is required to determine their precise role in C. difficile biology and contribution to the wider mobilome. Here, Tn5397 (21 kb) and ϕ027 (56 kb) were deleted from C. difficile 630 and R20291, respectively, using allele replacement facilitated by CRISPR-Cas9. The 630 Tn5397 deletant transferred PaLoc at the same frequency (1 × 10−7

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Materials Research And Technology
Immobilization of l-asparaginase on gold nanoparticles for novel drug delivery approach as anti-cancer agent against human breast carcinoma cells
...Show More Authors

View Publication
Scopus (68)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
The Role of Aspirin as Otoprotective Agent in Patients Receiving Amikacin Therapy
...Show More Authors

Objective: To investigate and prove that aspirin
protects, or at least attenuates amikacin ototoxicity in
humans.
Method: This study was conducted in 60 patients that
completed all
requirements .The patients were divided into two
groups:
• Control group: receive placebo treatment.
• Drug–treated group: They receive aspirin
coated tablets (1.5gm/ day), 500mg 8 hourly.
Both groups had similar aspects regarding the gender,
age and weight. The duration of therapy was 7 days
and dosage of amikacin was 1gm/day (500mg 12
hourly).
Results: Comparison of Audiometry test in
Ear/Nose/Throat (E.N.T.) Department (Pure Tone
Audiometry) at 1000 Hertz (Hz), 2000 Hz, 4000 Hz,
and 8000 Hz showed sig

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Application of Seed Mucilage Extracted from Lallemantia royleana as a Suspending Agent
...Show More Authors

The mucilage from the seeds of Lallemantia royleana family Labiatae was extracted and subjected to preformulation study for evaluation of its suitability for use as suspending agent. Furosemide suspensions were prepared using (1.5% w/v) of the extracted Lallemantia royleana mucilage, (1.5% w/v) chitosan and (0.35% w/v) xanthan gum. The mucilage was white in color and the average yield of dried mucilage obtained from L.royleana nutlets was 14 % w/w of the seeds used. It is sparingly soluble in water but swells in contact with it, giving a highly viscous solution. It is slightly acidic to neutral. It was found that the extracted natural mucilage of Lallemantia royleana exhibited a higher viscosity profil

... Show More
View Publication Preview PDF
Crossref (7)
Crossref