Preferred Language
Articles
/
joe-1968
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (1)
Scopus
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computational Thinking (CT) Among University Students
...Show More Authors

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms of content, computational thinking involves solving problems, studying data patterns, deconstructing problems using algorithms and procedures, doing simulations, computer modeling, and reasoning about abstract things. However, there is a lack of studies dealing with it and its skills that can be developed and utilized in the field of information and technology used in learning and teaching. The descriptive research method was used, and a test research tool was prepared to measure the level of (CT) consisting of (24) items of the type of multiple-choice to measure the level of "CT". The research study group consists of

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Active Vibration Control of Cantilever Beam by Using Optimal LQR Controller
...Show More Authors

Many of mechanical systems are exposed to undesired vibrations, so designing an active vibration control (AVC) system is important in engineering decisions to reduce this vibration. Smart structure technology is used for vibration reduction. Therefore, the cantilever beam is embedded by a piezoelectric (PZT) as an actuator. The optimal LQR controller is designed that reduce the vibration of the smart beam by using a PZT element.  

In this study the main part is to change the length of the aluminum cantilever beam, so keep the control gains, the excitation, the actuation voltage, and mechanical properties of the aluminum beam for each length of the smart cantilever beam and observe the behavior and effec

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref