Preferred Language
Articles
/
joe-1968
SECURED SMART CARD SIMULATION

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Arthrogrypotic Club Foot

Background: Arthrogryposis Multiplex congenita is a
rare disorder, characterized by multiple joint deformities
i.e. multiple congenital contractures, with shapelessly
cylindrical limbs and absent skin creases.
Club foot can be the only obvious deformity of this
widespread disorder.
Objective: To assess the most frequent recurrent
deformity after extensive soft-tissue release operations for
arthrogrypotic club foot and its appropriate treatment
regarding combined tendon transfer and bony operations.
Methods: A retrospective study of 14 patients with
arthrogrypotic club foot (28 feet), had been operated on by
multiple soft tissue and bony operations and followed in a
period between January (1993) till

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Partial Cryptography in Digital Media Environment Based on ECC Algebra

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
Scopus (16)
Crossref (8)
Scopus Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Determination of the Fertility of Southern Iraqi Soil Using Laser - Induced Breakdown Spectroscopy System

In this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Mechanical Engineering And Robotics Research
International Journal of Mechanical Engineering and Robotics Research

This paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closed-loop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadi

... Show More
Crossref (29)
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 08 2024
Journal Name
Technology In Agronomy
Harnessing automation techniques for supporting sustainability in agriculture

Automation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,

... Show More
Crossref
View Publication
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Improving Fatigue Life of Bolt Adapter of Prosthetic SACH Foot

In this research an analysis for improving the fatigue behavior (safety factor of fatigue) of non- articular prosthetic foot (SACH) in the region (Bolt Adapter).The laser peening was carried to the fatigue specimens to improving the fatigue properties of bolt’s material. The tests of mechanical properties and fatigue behavior were carried for material that the bolt manufacture from it, a region where the failure occur and inserted of these properties to the program of engineering analysis (Ansys) to calculate the safety factor of fatigue. The results showed that the safety factor after hardening by laser is increased by 42.8%.

Crossref (3)
Crossref
View Publication Preview PDF