Preferred Language
Articles
/
vhcNPo8BVTCNdQwC0WSe
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of complexity, increase key search space, and make the ciphered message difficult to be cracked by the attacker.

Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Improved photocatalytic degradation of methyl violet dye and pathogenic bacteria using g-C3N4 supported phosphotungstic acid heterojunction
...Show More Authors

Scopus (37)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables
...Show More Authors

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
The Improved Sand characterization of Mafe Field of Niger Delta by integrated well logs information and 3D seismic data
...Show More Authors

     Well log rock physics and seismic facies analysis was carried out with a view to enhancing reservoir sand characterization of Mafe Field of Niger Delta. Lithofacies were identified using suites of well logs and correlated across the block. Rock properties were estimated from wireline logs using empirical methods. Vp-porosity crossplot was used to characterize the delineated sandstone reservoirs by comparing observed clusters and trends with various rock physics models. Seismic attribute analysis was employed to detect lateral changes in lithology across the field. Reservoir A is a relatively clean sand, with low average volume of shale of 0.4, average thickness of 55m, good average porosity of 0.

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Materials Today Sustainability
Structure and performance of polyvinylchloride microfiltration membranes improved by green silicon oxide nanoparticles for oil-in-water emulsion separation
...Show More Authors

View Publication
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
On S*-Supplemented Modules
...Show More Authors

The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.

View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
S-K-nonsingular Modules
...Show More Authors

In this paper, we introduce a type of modules, namely S-K-nonsingular modules, which is a generalization of K-nonsingular modules. A comprehensive study of these classes of modules is given.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
⊕-s-extending modules
...Show More Authors

     The -s-extending modules will be purpose of this paper, a module M  is -s-extending if each submodule in M is essential in submodule has a supplement that is direct summand. Initially, we give relation between this concept with weakly supplement extending modules and -supplemented modules. In fact, we gives the following implications:

Lifting modules   -supplemented modules   -s-extending modules  weakly supplement extending modules.

It is also we give examples show that, the converse of this result is not true. Moreover, we study when the converse of this result is true.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Agricult.
FORECASTING THE EXCHANGE RATES OF THE US DOLLAR AGAINST THE IRAQI DINAR USING THE BOX-JENKINS METHODOLOGY IN TIME SERIES WITH PRACTICAL APPLICATION
...Show More Authors

The goal of the study is to discover the best model for forecasting the exchange rate of the US dollar against the Iraqi dinar by analyzing time series using the Box Jenkis approach, which is one of the most significant subjects in the statistical sciences employed in the analysis. The exchange rate of the dollar is considered one of the most important determinants of the relative level of the health of the country's economy. It is considered the most watched, analyzed and manipulated measure by the government. There are factors affecting in determining the exchange rate, the most important of which are the amount of money, interest rate and local inflation global balance of payments. The data for the research that represents the exchange r

... Show More
Scopus