Preferred Language
Articles
/
joe-1968
SECURED SMART CARD SIMULATION

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Education Program for Type 2 Diabetes Mellitus Patient's Self-efficacy toward Managing Feet at Endocrinology and Diabetes Center in Al-Rusafa Sector

Objective(s): to assess the effectiveness of educational program on improving diabetic foot self-efficacy concerning managing their feet. Methodology: A descriptive analytic (quasi – experimental) design study was carried out at Diabetic and Endocrinology Center in Baghdad- Rusafa Sector from 2nd of May 2017, to27th June 2018. Non-probability sample of (80) male and female diabetic patients were selected. The study instruments consisted of two major parts: first

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

Crossref (1)
Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
Scopus (10)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map

       Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computational Thinking (CT) Among University Students

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms of content, computational thinking involves solving problems, studying data patterns, deconstructing problems using algorithms and procedures, doing simulations, computer modeling, and reasoning about abstract things. However, there is a lack of studies dealing with it and its skills that can be developed and utilized in the field of information and technology used in learning and teaching. The descriptive research method was used, and a test research tool was prepared to measure the level of (CT) consisting of (24) items of the type of multiple-choice to measure the level of "CT". The research study group consists of

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Active Vibration Control of Cantilever Beam by Using Optimal LQR Controller

Many of mechanical systems are exposed to undesired vibrations, so designing an active vibration control (AVC) system is important in engineering decisions to reduce this vibration. Smart structure technology is used for vibration reduction. Therefore, the cantilever beam is embedded by a piezoelectric (PZT) as an actuator. The optimal LQR controller is designed that reduce the vibration of the smart beam by using a PZT element.  

In this study the main part is to change the length of the aluminum cantilever beam, so keep the control gains, the excitation, the actuation voltage, and mechanical properties of the aluminum beam for each length of the smart cantilever beam and observe the behavior and effec

... Show More
Crossref (6)
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More