Basrah Journal for Engineering Sciences
Login
Basrah Journal for Engineering Sciences
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Announcements
    • Contact

Search Results for security

Article
S-Box Design Utilizing 3D Chaotic Maps for Cryptographic Application

Jenan Ayad Namuq

Pages: 68-73

PDF Full Text
Abstract

In the realm of cryptography, the Substitution-box (S-box) is a critical component for enhancing the security of encryption algorithms. The inherent characteristics of Chaos, such as sensitivity to beginning conditions and unpredictability, make it a highly suitable choice for encryption applications. In this paper, proposed a method for generating S-Boxes using 3D chaotic maps algorithms including (Cat map, Henon map, Sine map, and Cosine map). The primary focus is on enhancing the security and efficiency of cryptographic systems by leveraging the inherent complexity and unpredictability of chaotic maps. The design methodology focuses on achieving high non-linearity, optimal avalanche effect, and Strict Avalanche Criterion ( SAC ), ensuring that minor changes in plaintext result in significant alterations in the ciphertext. Our study presents a detailed analysis of the generated S-Boxes, demonstrating their robustness against common cryptographic attacks. Key findings include significant improvements in nonlinearity, differential uniformity, and bijectivity compared to traditional methods. The test findings and performance analysis indicate that our proposed S-Box exhibits much lower values of Linear Probability ( LP ) and Differential Probability ( DP ), while maintaining a suitable average value of nonlinearity. Additionally, discussed the broader implications of our findings, emphasizing how the proposed method can be employed to produce high-quality analytical results that enhance the security measures of cryptographic applications. This work adds valuable context to existing research and highlights the potential for our model to outperform conventional S-Box generation techniques.

Article
A Comprehensive Review of Color Image Encryption Technology

Alyaa I. Dawood, Qabeela Q. Thabit, Taqwa O. Fahad

Pages: 56-63

PDF Full Text
Abstract

Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.

Article
Using PSO Algorithm to Find Optimal Number and Location by Connecting Distribution Generators to Improve the Iraqi 400 kV Super Grid

Dunya Sh. Wais, Huda A. Abbood, Ali F. Hassoon

Pages: 74-78

PDF Full Text
Abstract

Nowadays, it is crucial to assess power system contingencies resulting from line outages or generator failures, as they might cause breaches of system constraints. This is a vital part of ensuring the security of modern power supplies. Another hindrance to providing electricity to consumers is the increased system losses and voltage fluctuations resulting from increased demand and diminished power generation capacity. The DG connection is a crucial subject regarding these harmful consequences. This study is focused on clarifying the effect of distribution generators (DG) on mitigating congestion in electrical power transmission lines, minimizing power losses, and enhancing the voltage profile of the Iraqi national grid system. An optimization method is used to identify the optimal size and position based on fitness indicators such as voltage, power losses, and line congestion. The PSO algorithm is executed as proposed. The outcomes illustrate the effectiveness of the proposed technique for estimating the optimal size and placement of distributed generators (DG). At the same time, it reduces congestion and improves the voltage level of the bus. The proposed technique was implemented using the MATLAB/R2018a programming language.

1 - 3 of 3 items

Search Parameters

×

The submission system is temporarily under maintenance. Please send your manuscripts to

Go to Editorial Manager
Journal Logo
Basrah Journal for Engineering Sciences

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2026 College of Engineering, University of Basrah, its licensors, and contributors. All rights reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.