Preferred Language
Articles
/
nhcaOI8BVTCNdQwCxWPg
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE

Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Glaucoma Diagnosis Based on Retinal Fundus Image: A Review

    Glaucoma is one of the most dangerous eye diseases. It occurs as a result of an imbalance in the drainage and flow of the retinal fluid. Consequently, intraocular pressure is generated, which is a significant risk factor for glaucoma. Intraocular pressure causes progressive damage to the optic nerve head, thus leading to vision loss in the advanced stages. Glaucoma does not give any signs of disease in the early stages, so it is called "the Silent Thief of Sight". Therefore, early diagnosis and treatment of retinal eye disease is extremely important to prevent vision loss. Many articles aim to analyze fundus retinal images and diagnose glaucoma. This review can be used as a guideline to help diagnose glaucoma. It presents 63 artic

... Show More
Scopus (5)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
Scopus (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Efficacy of Some Formulations of the Insecticide Chlorpyrifos against Microcerotermies diversus Silv. On Citrus Tree Orchards

The eflicacy  of six formula from chloropyrifos against tem1ite

Microterotermes - diversus on citrus tree orchards has been

tested years .

Data!rom field trials confirmed that Dursbau 4TC, chlorpyrifos -

500 EC and Talaban 40,8 TC at rate 100 mL L protected citrus trees for two years.  While ch1orfate. 40.8 TC, Dormate 40,8TC, Yamasban

40,8 TC protected  them for 16,16 and 12 months respectively at the same concentration.

But the rate of 5m1/ L of Dursban, chropyfros 500 EC , Chlorfat,

Tafabun yamashan and Dormate protected the trees tor 24,16,4,4,2

and 4 months  , respectively .

View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of tea tree oil on candida adherence and surface roughness of heat cure acrylic resin

Background: Denture cleansing was an important step that could prevent the spread of infection and improve a patient's health, the durability of the dentures, and the overall quality of life; therefore, it was necessary to choose a suitable cleanser that, in addition to being effective, did not have an unfavorable effect on the qualities of the denture base resin itself when used for an extended period. For this purpose, this study aimed to evaluate the effect of tea tree oil (TTO) on Candida albicans adhesion and the surface roughness property of poly(methyl methacrylate) denture material after immersion in TTO. Methods: A total of 55 heat-cured acrylic resin specimens were used for C. albicans adherence and surface roughness tests. The

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
Crossref
View Publication Preview PDF