{"id":"https://openalex.org/W4388103968","doi":"https://doi.org/10.1109/icset59111.2023.10295083","title":"SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)","display_name":"SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)","publication_year":2023,"publication_date":"2023-10-02","ids":{"openalex":"https://openalex.org/W4388103968","doi":"https://doi.org/10.1109/icset59111.2023.10295083"},"language":"en","primary_location":{"id":"doi:10.1109/icset59111.2023.10295083","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icset59111.2023.10295083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Udai Wasmi Abboud","orcid":null},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Udai Wasmi Abboud","raw_affiliation_strings":["Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq","Computer Sciences Department, College of Computer and Mathematical Sciences, Tikrit University, Tikrit, Iraq"],"affiliations":[{"raw_affiliation_string":"Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq","institution_ids":["https://openalex.org/I72539421"]},{"raw_affiliation_string":"Computer Sciences Department, College of Computer and Mathematical Sciences, Tikrit University, Tikrit, Iraq","institution_ids":["https://openalex.org/I72539421"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022240335","display_name":"Moceheb Lazam Shuwandy","orcid":"https://orcid.org/0000-0001-6257-7874"},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Moceheb Lazam Shuwandy","raw_affiliation_strings":["Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq","Computer Sciences Department, College of Computer and Mathematical Sciences, Tikrit University, Tikrit, Iraq"],"affiliations":[{"raw_affiliation_string":"Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq","institution_ids":["https://openalex.org/I72539421"]},{"raw_affiliation_string":"Computer Sciences Department, College of Computer and Mathematical Sciences, Tikrit University, Tikrit, Iraq","institution_ids":["https://openalex.org/I72539421"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I72539421"],"apc_list":null,"apc_paid":null,"fwci":0.1418,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46724207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"10","issue":null,"first_page":"61","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11992","display_name":"CCD and CMOS Imaging Sensors","score":0.9366000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11992","display_name":"CCD and CMOS Imaging Sensors","score":0.9366000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12941","display_name":"Embedded Systems and FPGA Design","score":0.9337000250816345,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.92330002784729,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8333044648170471},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7909080982208252},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6668498516082764},{"id":"https://openalex.org/keywords/encryption-software","display_name":"Encryption software","score":0.5921221971511841},{"id":"https://openalex.org/keywords/disk-encryption-hardware","display_name":"Disk encryption hardware","score":0.4804494082927704},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4505331516265869},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.446471631526947},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4455811381340027},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.4243062138557434},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4126827120780945},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.39989036321640015},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.39054417610168457},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.36881256103515625},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.3368440866470337},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.29521191120147705},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1459285020828247}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8333044648170471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7909080982208252},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6668498516082764},{"id":"https://openalex.org/C158104961","wikidata":"https://www.wikidata.org/wiki/Q5375622","display_name":"Encryption software","level":5,"score":0.5921221971511841},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.4804494082927704},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4505331516265869},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.446471631526947},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4455811381340027},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.4243062138557434},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4126827120780945},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.39989036321640015},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.39054417610168457},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.36881256103515625},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.3368440866470337},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.29521191120147705},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1459285020828247}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icset59111.2023.10295083","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icset59111.2023.10295083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.6499999761581421,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W113765992","https://openalex.org/W1497481941","https://openalex.org/W1597699498","https://openalex.org/W1833051225","https://openalex.org/W2189219216","https://openalex.org/W2341270335","https://openalex.org/W2502199022","https://openalex.org/W2618824331","https://openalex.org/W2753238659","https://openalex.org/W2792593297","https://openalex.org/W2805793141","https://openalex.org/W2887056772","https://openalex.org/W2946245473","https://openalex.org/W3004911477","https://openalex.org/W3031343884","https://openalex.org/W3033053846","https://openalex.org/W3133596308","https://openalex.org/W3169069649","https://openalex.org/W4210652387","https://openalex.org/W4214884566","https://openalex.org/W4281872409","https://openalex.org/W4289536748","https://openalex.org/W4367397674","https://openalex.org/W6638644560"],"related_works":["https://openalex.org/W2381892741","https://openalex.org/W2376666149","https://openalex.org/W287086041","https://openalex.org/W2975422485","https://openalex.org/W2366148382","https://openalex.org/W4214720436","https://openalex.org/W2039973022","https://openalex.org/W1915047390","https://openalex.org/W3088429077","https://openalex.org/W1975017338"],"abstract_inverted_index":{"There":[0],"are":[1,8,137],"many":[2],"encryption":[3,24,44,63,136,187],"algorithms;":[4],"some":[5],"of":[6,22,36,43,52,65,82,135,178,207,210,215,220],"them":[7,60],"strong":[9],"but":[10],"slow":[11],"in":[12,26,128,200,217,242],"decryption,":[13],"unlike":[14],"other":[15],"methods.":[16],"The":[17,70,116,143,228],"MOLAZ":[18,71,141],"method":[19,72],"is":[20,89,111,169,224,231],"one":[21],"the":[23,34,41,62,75,83,86,93,101,108,125,131,140,153,174,179,191,208,213,218,243],"techniques":[25],"UUM\u2019s":[27],"thesis":[28],"-":[29],"2010":[30],"used":[31,184],"to":[32,58,78,123,152,236],"improve":[33],"difficulty":[35],"protecting":[37],"information":[38],"while":[39,161],"preserving":[40],"speed":[42,214],"and":[45,56,96,120,133,165,188,202,212,238],"decryption.":[46,189],"This":[47],"approach":[48],"involves":[49],"alternating":[50],"utilization":[51],"two":[53],"algorithms,":[54],"AES-128":[55,216],"AES256,":[57],"integrate":[59],"within":[61],"procedure":[64],"a":[66,196],"single":[67],"plain":[68],"text.":[69],"depends":[73],"on":[74],"SDA":[76,91,117],"algorithm":[77],"organize":[79],"all":[80],"operations":[81,98],"encryption/decryption.":[84],"However,":[85],"biggest":[87],"challenge":[88],"that":[90,147,223],"performs":[92],"segmentation,":[94],"distribution,":[95],"aggregation":[97],"sequentially,":[99],"making":[100],"time":[102,132],"loss":[103],"cost":[104],"significant,":[105],"especially":[106],"if":[107],"data":[109,198,241],"volume":[110],"enormous.":[112],"In":[113,156],"this":[114],"study,":[115],"was":[118],"developed":[119,226],"usually":[121],"designed":[122],"segment":[124],"system's":[126],"work":[127],"parallel,":[129],"where":[130],"complexity":[134],"shortened":[138],"by":[139,172],"method.":[142],"system":[144],"generates":[145],"sub-systems":[146],"operate":[148],"independently":[149],"without":[150],"referring":[151],"central":[154],"system.":[155],"particular,":[157],"saving":[158],"hardware":[159],"resources":[160],"implementing":[162],"256-bit":[163],"AES":[164,167,186],"128-bit":[166],"modules":[168,180],"made":[170],"possible":[171],"reducing":[173],"processing":[175],"time.":[176],"Most":[177],"created":[181],"can":[182],"be":[183],"for":[185,233],"Besides,":[190],"architecture":[192,230],"will":[193],"also":[194],"provide":[195],"fast":[197],"rate":[199],"encoding":[201],"decoding.":[203],"So,":[204],"take":[205],"advantage":[206],"power":[209],"AES-265":[211],"presence":[219],"big":[221],"data;":[222],"why":[225],"SDA.":[227],"proposed":[229],"ideal":[232],"applications":[234],"critical":[235],"encrypting":[237],"decrypting":[239],"massive":[240],"hard":[244],"disk":[245],"etc.":[246]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
