Preferred Language
Articles
/
joe-1561
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the experimentally generated sequences revealed a high degree of randomness, which proves its viability to modern applications, such as cryptography and communication system simulation and modeling. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-khwarizmi Engineering Journal
Recovery of Aluminum from Industrial Waste (Slag) by Melting and Electrorefining Processes
...Show More Authors

Slag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid waste according to the European Catalogue for Hazardous Wastes. Hence, recovery of aluminum not only saves the environment, but also has advantages of financial and economic returns. In this research, aluminum was recovered and purified from the industrial wastes generated as waste from both of State Company for Electrical and Electronic Industries (Baghdad/AlWaziriya) and General Company for Mechanical Industries (Babylon/-Al-Escandria). It was found that these wastes contain tiny proportions of other elements such as iron, copper, nickel, titanium, lead, and potassium. Wastes were

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation
...Show More Authors

Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review
...Show More Authors

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Recycling waste papers in green cement mortars
...Show More Authors

This work investigates the utilization of waste papers (natural and industrial) i.e (citrus aurantium and papers A4) mortars containing specified contents 0.5%, 1%, 1.5% of waste papers were prepared and cured. Mechanical characteristics such as compressive and bending strengths, hardness and water absorption were determined for the mortars mixed with the waste papers and compared with those obtained from the pure mortars. Results showed that the addition of waste paper leads to increase the hardness to (69 - 68.5) shore D for (natural and industrial) wastes materials respectively comparing with pure specimen 66 shore D. The compressed strength of the mortar cement specimen cured for 28 days from 13 MPa to (17-18) MPa for (natural and in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Tensile and Compressive Properties of Kaolin Rienforced Epoxy
...Show More Authors

Abstract

The toughening of epoxy resins with the addition of organic or inorganic compounds is of great interest nowadays, considering their large scale of applications. In the present work, composites of epoxy are synthesized with kaolin particles having different particle sizes as reinforcement. Composites of epoxy with varying concentration (0 to 40 weight %) of kaolin was prepared by using hand lay method. The variation of mechanical properties such as modulus of elasticity, yield, tensile, and compressive strength with filler content was evaluated. The composite showed improved modulus of elasticity and compressive properties on addition of filler. In contrast, the tensile and yield strength of the composite

... Show More
View Publication Preview PDF