International Journal of Engineering Research and Advanced Technology - IJERAT (ISSN: 2454-6135) 2021-01-10T20:50:41+08:00 Sretechjournal Publications Open Journal Systems <p><strong>Journal Title:</strong> International Journal of Engineering Research and Advanced Technology</p> <p><strong>ISSN: </strong> 2454-6135</p> <p><strong>Crossref DOI Prefix:</strong> 10.31695/IJERAT</p> <p><strong>Digital Archiving: </strong> PORTICO and LOCKSS</p> <p><strong>Email:</strong></p> <p><strong>Editor-in-Chief:</strong> Dr. U. C. Jha.</p> <p>The <strong>International Journal of Engineering Research and Advanced Technology</strong> (IJERAT) was founded with a mission to develop a reliable platform and to provide unrestricted access to scientific literature for rapid dissemination of recent updates in various disciplines of Science, Engineering, and technology. Readers can have access with no cost (Open Access) and avail the facility to enrich their scientific understanding <strong>International Journal of Engineering Research and Advanced Technology</strong>The in the relevant topics.</p> <p><strong>Call for Papers: <a href="">Submit your paper for Peer review.</a></strong></p> <p><strong>Publication Frequency: Monthly</strong></p> <p>Deadline: <strong>Submission is open</strong></p> <p><strong>Review notification: Within two weeks</strong></p> <p><strong>Publication: </strong>Accepted papers will be added immediately to the "current" volume's Table of Contents.</p> <p>Download: <a href="" target="_blank" rel="noopener">Paper Template</a></p> <p>Email:</p> Improved key of RSA Algorithm Generated from The image based on SHA256 Algorithm 2021-01-06T23:27:39+08:00 Rasha Thamer Shawe <p><em>At the present time, information security has become very necessary and is considered a very difficult problem in the event that it is exposed by the attackers and becomes easy and available to them. Therefore, data protection and non-disclosure to unauthorized persons are required to do so. The solution is to encrypt it and there are a large number of encryption algorithms in use. In this paper, both the RSA generic encryption algorithm and the hash algorithm known as SHA256 were used, in which the RSA algorithm was improved by generating the algorithm keys from an image generated with the SHA256 hashing algorithm. Where two keys are formed, one of which is public for encryption and is available and the other is a private key that is not disclosed only to the person who has access to the message, and effective encryption of the data was produced in addition to the retrieval of the original text. The proposed method has been programmed in VisualBaic.Net 2012 language.</em></p> 2021-01-06T00:00:00+08:00 Copyright (c) 2021 Rasha Thamer Shawe Image Encryption based on a New Generation of Key from Rubik's Cube Principle of AES Algorithm 2021-01-10T20:50:41+08:00 Raghda Sattar Jabar Iman Hussein AL-Qinani Zainab Khyioon Abdalrdha <p><em>Encryption is the most secure way to save data, whether text, images, video, or any other type of multimedia, as in recent years, a lot of encryption algorithms have been suggested to protect this digital data from all kinds of attacks, and the protection process was carried out through encryption and the use of many algorithms. Through the proposed method, this research was focused on an important aspect, which is protecting the key by creating a new method for the algorithm key, as the more difficult it is to know the key, the more difficult it is to break the algorithm, as Rubik's Cube method was used to create the key of the AES algorithm, where it performs just throw the cube to generate the key, then the improved algorithm was used to encrypt the images and then restore the original image without problems and the process was of a high quality as the key configuration time was reduced and a good level of security was provided. The proposed method has been programmed in Visual Basic.Net 2015 language.</em></p> 2021-01-10T00:00:00+08:00 Copyright (c) 2021 Raghda Sattar Jabar, Iman Hussein AL-Qinani , Zainab Khyioon Abdalrdha The Use of Input Words Vectors to Detect Crowd Region in Images 2020-12-09T22:03:45+08:00 Sally Ali Abdulateef Lamyaa Mohammed Kadhim Ekhlas Wattan Ghandawi <p>Human crowd analysis has common utilizations from the urban engineering and traffic management to law enforcement. They all need a crowd for first being detected, and is the issue that has been dealt with in the present study. Considering an image, the algorithm that has been proposed in this paper performs a segmentation of that image to crowd and non-crowd areas. The fundamental concept is capturing two main characteristics of the crowd: (a) on a narrower scale, its main elements have to appear like humans (only weakly so, as a result of the low resolution, dressing variations, occlusion, and so on), whereas (b) on the wider scale, the crowd intrinsically includes elements of the redundant appearance. The proposed approach makes use of that through the utilization of underlying statistical framework which has been based on the quantized features of the SURF. The two previously mentioned characteristics of the crowds have been obtained through the resultant statistical model responses’ feature vector, which describe the level of crowd-like appearances around the location of an image with the increase of the spatial level around it.</p> 2021-01-14T00:00:00+08:00 Copyright (c) 2021 Sally Ali Abdulateef, Lamiaa Mohammed Khadim, Ekhlas Wattan Ghandawi