{"id":"https://openalex.org/W3042477619","doi":"https://doi.org/10.1109/comm48946.2020.9142003","title":"Enhancement of an Encryption System Performance using MPI","display_name":"Enhancement of an Encryption System Performance using MPI","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3042477619","doi":"https://doi.org/10.1109/comm48946.2020.9142003","mag":"3042477619"},"language":"en","primary_location":{"id":"doi:10.1109/comm48946.2020.9142003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9142003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000724182","display_name":"Islam Amar","orcid":"https://orcid.org/0009-0004-7590-0748"},"institutions":[{"id":"https://openalex.org/I37417134","display_name":"Palestine Polytechnic University","ror":"https://ror.org/03wwspn40","country_code":"PS","type":"education","lineage":["https://openalex.org/I37417134"]}],"countries":["PS"],"is_corresponding":true,"raw_author_name":"Islam Amar","raw_affiliation_strings":["College of Information Technology and Computer Engineering, Palestine Polytechnic University PPU, Hebron, Palestine"],"affiliations":[{"raw_affiliation_string":"College of Information Technology and Computer Engineering, Palestine Polytechnic University PPU, Hebron, Palestine","institution_ids":["https://openalex.org/I37417134"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033247471","display_name":"Mohammed Abutaha","orcid":"https://orcid.org/0000-0002-2480-0913"},"institutions":[{"id":"https://openalex.org/I37417134","display_name":"Palestine Polytechnic University","ror":"https://ror.org/03wwspn40","country_code":"PS","type":"education","lineage":["https://openalex.org/I37417134"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Mohammed Abutaha","raw_affiliation_strings":["College of Information Technology and Computer Engineering, Palestine Polytechnic University PPU, Hebron, Palestine"],"affiliations":[{"raw_affiliation_string":"College of Information Technology and Computer Engineering, Palestine Polytechnic University PPU, Hebron, Palestine","institution_ids":["https://openalex.org/I37417134"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000724182"],"corresponding_institution_ids":["https://openalex.org/I37417134"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06713383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8275136947631836},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.791379451751709},{"id":"https://openalex.org/keywords/message-passing-interface","display_name":"Message Passing Interface","score":0.5915856957435608},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5605789422988892},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5484132170677185},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5408497452735901},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.516035795211792},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46915993094444275},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.42676717042922974},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.41638708114624023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3630638122558594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3627326488494873},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34037214517593384},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.27888891100883484},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2235035002231598}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8275136947631836},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.791379451751709},{"id":"https://openalex.org/C166782233","wikidata":"https://www.wikidata.org/wiki/Q127879","display_name":"Message Passing Interface","level":3,"score":0.5915856957435608},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5605789422988892},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5484132170677185},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5408497452735901},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.516035795211792},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46915993094444275},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.42676717042922974},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.41638708114624023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3630638122558594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3627326488494873},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34037214517593384},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.27888891100883484},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2235035002231598},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comm48946.2020.9142003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9142003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W42305685","https://openalex.org/W1536235319","https://openalex.org/W1592551687","https://openalex.org/W1978868455","https://openalex.org/W1993294505","https://openalex.org/W2036270521","https://openalex.org/W2108879934","https://openalex.org/W2133994512","https://openalex.org/W2164303766","https://openalex.org/W2612903991","https://openalex.org/W2891021314","https://openalex.org/W2904536104","https://openalex.org/W6832694695"],"related_works":["https://openalex.org/W2124048060","https://openalex.org/W1902983110","https://openalex.org/W2378910916","https://openalex.org/W4386915331","https://openalex.org/W2086666199","https://openalex.org/W1511717675","https://openalex.org/W2116006827","https://openalex.org/W2361929291","https://openalex.org/W1493716264","https://openalex.org/W1997862718"],"abstract_inverted_index":{"Nowadays":[0],"with":[1],"a":[2,17,35,52,71],"tremendous":[3],"speed":[4,103],"and":[5,46,58],"continuous":[6],"development,":[7],"the":[8,12,62,88,91,98,107],"world's":[9],"connection":[10],"to":[11,16,40,55,86,106],"Internet":[13],"has":[14,21,33],"increased":[15],"point":[18],"that":[19,97],"it":[20],"become":[22,34],"part":[23],"of":[24,90],"their":[25],"unsteady":[26],"lives.":[27],"Thus":[28],"as":[29],"technology":[30],"evolves,":[31],"encryption":[32],"priority":[36],"for":[37],"our":[38],"lives":[39],"protect":[41],"sensitive":[42],"data":[43,60],"from":[44],"hacking":[45],"piracy.":[47],"However,":[48],"this":[49,67],"process":[50],"takes":[51],"long":[53],"time":[54],"transfer,":[56],"handle":[57],"program":[59],"by":[61],"appropriate":[63],"electronic":[64],"means.":[65],"In":[66],"paper":[68],"we":[69],"present":[70],"new":[72,99],"methodology":[73],"which":[74],"depends":[75],"on":[76,81],"distributed":[77],"memory":[78],"architecture":[79],"based":[80],"message":[82],"passing":[83],"Interface(":[84],"MPI)":[85],"enhance":[87],"performance":[89],"sequential":[92],"algorithm.":[93],"Our":[94],"results":[95],"showed":[96],"model":[100],"give":[101],"2x":[102],"up":[104],"compared":[105],"previous":[108],"one.":[109]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
