Startseite Technik The LBC-3 lightweight encryption algorithm
Artikel Open Access

The LBC-3 lightweight encryption algorithm

  • Saule Nyssanbayeva , Nursulu Kapalova EMAIL logo , Armiyanbek Haumen und Olzhas Suleimenov
Veröffentlicht/Copyright: 11. Oktober 2022
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The process of generating the round keys of the algorithm is also considered. The results of the study of the cryptographic properties of the algorithm using the “avalanche effect” and statistical tests are presented. The avalanche property was tested for each round with each bit of the source text changing. Based on the work carried out, it was found that the proposed encryption algorithm is effective in providing a good avalanche effect, and the binary sequence obtained after encryption is close to random. The research revealed good cryptographic properties of this algorithm.

1 Introduction

The main directions of the development of cryptography are largely associated with the development of communications, information technology, and computing hardware. It is the progress in these areas that has made possible the widespread use of compact devices with low computing power that have access to the Internet and implement the concept of the “Internet of Things.” The Internet of Things is a wireless self-configuring network between objects such as household appliances, vehicles, various sensors, and detectors, as well as RFID (Radio Frequency IDentification) tags. Severe restrictions on the internal computing resources of such devices make it difficult or impossible to use classical cryptographic algorithms. This led to the emergence of a new section of cryptography – lightweight cryptography – aimed at creating strong cryptographic algorithms and protocols with acceptable strength in the context of limited resources [1,2].

Along with the effective implementation of known block cipher algorithms, work on the creation of new block ciphers focused on optimal implementation at the microprogram or hardware level for specialized applications is topical. Most of the research work (R&D) on the development of lightweight cryptoalgorithms has been carried out in the field of block cipher algorithms. Recently, many lightweight solutions have been proposed [3].

The National Institute of Standards and Technology has initiated a public standardization process to select one or more data-associated authentication encryption and hashing schemes suitable for resource-constrained devices.

In February 2019, 57 candidates were submitted to NIST for consideration. Of those, 56 were accepted as candidates in the first round in April 2019. Four months later, NIST selected 32 candidates for a second round. In March 2021, NIST announced 10 finalists who will advance to the final round of the selection process.

As a result, the following algorithms made it to the final: ASCON, Elephant, GIFT-COFB, Grain-128AEAD, ISAP, PHOTON-Beetle, Romulus, SPARKLE, TinyJAMBU, and Xoodyak.

In Kazakhstan, in the field of information security, foreign hardware and software are mainly used, which are transparent to their developers. Therefore, the development of domestic cryptographic information protection facilities (CIPFs), including home-grown lightweight encryption algorithms based on previously developed encryption algorithms, is currently a pressing issue.

The Laboratory of Information Security of the Institute of Information and Computational Technologies (IICT) of the Committee of Science (CS) of the Ministry of Education and Science (MES) of the Republic of Kazakhstan (RK) conducts research scientific work on the development and analysis of new encryption systems, electronic digital signature, generation of cryptographic keys, and authentication, as well as the creation of software CIPFs based on them. This article presents the results of creating a domestic lightweight encryption algorithm and studying its cryptographic properties.

2 Description of the algorithm

The developed LBC-3 algorithm is structurally different from existing lightweight algorithms such as PRESENT, although the architecture is similar. The proposed LBC-3 algorithm has its own substitution table (S-Box), and the R1 function has been added to improve diffusion, due to which high “avalanche effect” rates are achieved. It should also be noted that, unlike PRESENT, in LBC-3, round keys are generated in five rounds using the R2 function.

The LBC-3 algorithm is a symmetric block algorithm and has the following main characteristics:

  1. Block length is 64 bits,

  2. Master key length is 80 bits,

  3. Round key length is 64 bits, and

  4. Number of rounds is 20.

The structure of the algorithm is shown in Figure 1.

Figure 1 
               General scheme of the LBC-3 algorithm.
Figure 1

General scheme of the LBC-3 algorithm.

The encryption process consists of several rounds, each of which includes the following transformations:

  1. S transformation,

  2. R1 transformation,

  3. L transformation, and

  4. X transformation.

2.1 S Transformation

Every modern encryption algorithm uses a non-linear transformation in the form of a substitution table. It has been proven to be a strong cryptographic primitive against linear and differential cryptanalysis [4]. Lightweight block algorithms for non-linear transformations also use tabular substitutions – S-boxes. However, due to the requirement for lightweight algorithms, S-boxes should not take up a large amount of memory (ROM and RAM). To store a table that replaces 8-bit data fragments, 256 bytes are needed, and to store a 4-bit S-box, only 16 bytes are required [5]. Hence, 4-bit S-boxes are mainly used in lightweight cryptography. These include algorithms such as PRESENT and SERPENT. For the non-linear transformation of the LBC-3 algorithm, the 4-bit form of the substitution table was chosen. This S-box was constructed using a pseudo-random sequence generator (Table 1) and used to create a lightweight algorithm.

Table 1

S-Box

0 1 2 3 4 5 6 7 8 9 A B C D E F
A 2 7 E C 6 F 1 0 B 5 3 9 4 8 D

The non-linear transformation of the LBC-3 algorithm uses operations on half-bytes (4 bits). For each half-byte, a non-linear bijective substitution is applied, given by a one-dimensional array of 16 elements (4-bit S-box).

A 16-bit subblock is fed to the input of the transformation S and is divided into four groups of 4 bits. Each half-byte of the input block is an index of the value in the substitution table (Table 1). Thus, at the output of the transformation S, a set of half-bytes will be obtained, located at the corresponding indices in the given substitution table:

S ( a ) = S ( a 0 ) || S ( a 1 ) || S ( a 2 ) || S ( a 3 ) , S : V 4 V 4 ,

where a is 16 input bits and a i are half-bytes of the subblock.

2.2 R1 transformation

The linear transformation of the LBC-3 algorithm is a cyclic shift of bits and sub-blocks to a certain position. The input block of bits is divided into four subblocks of 16 bits each. The linear transformation at the subblock level is performed using the R1 function, which is applied only to the first subblock (Figure 1). The result of the R1 function is added to the second block modulo 2 (XOR operation). The function R1 has the following form:

R 1 ( a ) = a ( a 7 ) ( a 10 ) , a F 2 16 ,

where “≪” is the operator of circular shifting the bits of the subblock to the left.

2.3 L Transformation (cyclic shift of subblocks)

This linear transformation is performed on the whole block. Here, the subblocks are rotated to the left by one position; i.e., the second subblock moves to the first position, the third subblock replaces the second block, the fourth subblock replaces the third one, and the first subblock moves to the fourth position (Figure 1).

2.4 X Transformation (adding round keys)

After rotating the subblocks, round keys modulo 2 are added. The round key, consisting of 64 bits, is divided into four subkeys of 16 bits each and added to the corresponding data subblocks.

2.5 Encryption process

Encryption by the LBC-3 algorithm begins with “whitening” the source text; that is, “zero keys” are added to the source text before the round transformation. The initial 64 bits of the master key are taken as “zero keys.” Next, round transformations are performed.

If we designate the round encryption process as E, we get:

E ( A ) = [ X ( L ( S ( a 0 ) || R 1 ( S ( a 0 ) ) S ( a 1 ) || S ( a 2 ) || S ( a 3 ) ) ) ] rc = B , rc = 1 , 20 ̅ ,

where A = { a 0 , a 1 , a 2 , a 3 } is the 64-bit source text, { a i } are 16-bit subblocks. B is the 64-bit ciphertext, rc is the number of rounds, and means modulo 2 addition.

2.6 Decryption process

The decryption process is performed in reverse order. Here, instead of the transformations S and L, the inverse transformations S −1 and L −1 are used, and the transformations R1 and X remain the same as in the encryption process (Table 2):

D ( B ) = [ S 1 ( L 1 ( X ( b i ) ) ) ] rc = A , rc = 1,20 ̅ ,

where { b i } are ciphertext subblocks. Function R1 is executed only for subblock { b 1 } . That is, { b 2 } = R 1 ( b 1 ) b 2 .

Table 2

Reverse S-box

0 1 2 3 4 5 6 7 8 9 A B C D E F
8 7 1 B D A 5 2 E C 0 9 4 F 3 6

2.7 Round key generation

The LBC-3 algorithm has a master key of 80 bits. From this sequence of bits, the round keys of the algorithm are generated. The key generation process consists of several transformations. The scheme for generating round keys is shown in Figure 2.

Figure 2 
                  Scheme for generating round keys of the LBC-3 algorithm.
Figure 2

Scheme for generating round keys of the LBC-3 algorithm.

The master key of 80 bits is divided into five subblocks of 16 bits each. The key generation process itself has internal transformation rounds. The R2 function is applied to the first subblock and has the following form:

R 2 ( a ) = a ( a 6 ) ( a 13 ) , a F 2 16 ,

where “≪” is the subblock left-shift bit operator. Then, the sub-blocks are rotated to the left by one position (Figure 2). Each subblock is then replaced via a 4-bit S-box with new values. Here, the S-box from the main encryption algorithm is used (Table 1). The resulting new bit values are combined into one sequence, forming 80 bits. These bits are grouped by 4 bits, forming 20 groups. These groups of bits are permutated according to Table 3 (P-Box).

Table 3

P-Box

A 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
B 5 12 18 16 10 13 20 2 15 4 17 7 19 3 6 9 1 8 11 14

In the table, row A is the initial position of 4-bit groups, row B is the new position of these bits in the sequence. Thus, the earlier transformations (function R2, rotation, S-box, P-box) are repeated 5 times (rounds). After five rounds of 80 bits, the initial 64 bits (on the left side of the sequence) are taken and used as round encryption (decryption) keys. The 80 bits obtained from the previous transformations will be used as the basis for the next round of keys. This process continues until all round encryption keys are obtained.

3 Study of the cryptographic properties of the algorithm

First, such a cryptographic property of the LBC-3 algorithm as the “avalanche effect” was investigated. To check for a good avalanche effect in a particular algorithm, an avalanche criterion is used. A cryptographic algorithm satisfies the avalanche criterion if a change in one bit of the input sequence changes, on average, half of the output bits.

Using the developed computer program that implements the avalanche criterion, the LBC-3 algorithm was investigated for the presence of the avalanche effect.

To characterize the degree of the avalanche effect in the transformation, an avalanche parameter is determined and used – the numerical value of the deviation of the probability of changing bits in the output sequence when bits in the input sequence change from the required probability value equal to 0.5.

For the avalanche criterion, the value of the avalanche parameter is determined by the formula

ε i = 2 k i 1 ,

where i is the number of the bit to be changed at the input and k i is the probability of changing half of the bits in the output sequence when the ith bit in the input sequence is changed.

The values of the specified avalanche parameter are in the range from 0 to 1 inclusive. In this case, the smaller the value of the avalanche parameter, the stronger the avalanche effect in the transformation [6].

The results of the study are shown in Tables 46.

Table 4

Results of the study of the avalanche effect

Round number Number of bits changed Avalanche effect Avalanche parameter value ɛ i Round number Number of bits changed Avalanche effect Avalanche parameter value ɛ i
1 10 0.1563 0.6874 11 32 0.5 0
2 19 0.2969 0.4062 12 34 0.5313 0.0626
3 30 0.4688 0.0624 13 26 0.4063 0.1874
4 29 0.4531 0.0938 14 35 0.5469 0.0938
5 34 0.5313 0.0626 15 36 0.5625 0.125
6 29 0.4531 0.0938 16 30 0.4688 0.0624
7 40 0.625 0.25 17 35 0.5469 0.0938
8 33 0.5156 0.0312 18 31 0.4844 0.0312
9 34 0.5313 0.0626 19 34 0.5313 0.0626
10 34 0.5313 0.0626 20 33 0.5156 0.0312
Table 5

Results of the study of the avalanche effect by rounds

Rounds 1 2 3 4 5 6 7 8 9 10
Average value of the avalanche parameter 0.8837 0.7671 0.5805 0.3877 0.2031 0.1479 0.0952 0.0849 0.0947 0.0991
Rounds 11 12 13 14 15 16 17 18 19 20
Average value of the avalanche parameter 0.1147 0.0879 0.0928 0.0937 0.103 0.0879 0.0845 0.0869 0.0962 0.083
Table 6

Results of the avalanche effect

Source text Ciphertext Avalanche effect
11 11 11 11 11 11 11 11 E3 0D DC 82 CB 19 35 B0 0.4375 (28)
11 11 11 11 11 11 11 10 EC CF 52 D1 D8 0A 5B F2
11 22 33 44 55 66 77 88 0B 16 94 70 8A E4 0D 56 0.4063 (26)
11 22 33 44 55 66 77 87 49 44 89 00 42 61 DB 67
00 00 00 00 00 00 00 00 07 77 C8 DD 8F FD 55 A6 0.4844 (31)
10 00 00 00 00 00 00 00 B2 96 C8 6F 78 93 FD E5

The following table shows the number of output bits changed in each round, given that the first bit of the source text is changed.

During the study of the “avalanche effect” property, all values of the avalanche parameter were calculated when changing each bit of the source text for each round. The calculation results are shown in Table 5.

According to the results of the study, the best indicator of the avalanche effect is achieved after the sixth round of encryption (Figure 3). Based on this result, it can be assumed that 20-round encryption will provide high security of the ciphertext.

Figure 3 
               Histogram of avalanche parameter values in rounds 6–9.
Figure 3

Histogram of avalanche parameter values in rounds 6–9.

Test examples of the avalanche effect of the algorithm are listed in Table 6.

4 Statistical analysis of the algorithm

For statistical analysis, 20 files of various types and sizes were selected, containing from 20 to 1,000 kb of information. Data on the selected files are presented in Table 7. Testing was carried out using the software package “Automated system for the selection of statistical tests by D. Knuth and graphic tests,” which implements a set of statistical tests.

Table 7

Plaintext files used in testing the LBC-3 algorithm

File number File type File format
1–5 *.docx Microsoft Word document
6–10 *.xls Microsoft Excel document
11–15 *.pptx Microsoft PowerPoint document
16–20 *.pdf Cross-platform open format
21–25 *.rar Archived RAR document
26–30 *.zip Archived ZIP document
31–35 *.jpg Graphic document in raster format
36–40 *.png Graphic document in raster format
41–45 *.txt Text file
46–50 *.gif Graphic document in raster format
51–55 *.html Web document
56–60 *.cat System file for merging files
61–65 *.mp4 Audio file
66–70 *.wmz Vector Image Media file
71–75 *.dll Dynamic Link Library file
76–80 *.log Event log file
80–85 *.lex Adobe Linguistic Library Data File
86–90 *.djvu Graphic and text format document
91–95 *.xml Web document
96–100 *.mp3 Audio file

After converting each file using five different keys, the corresponding encrypted files were obtained. The resulting 100 files were subjected to graphical and evaluation statistical tests. In graphical tests, the statistical properties of ciphertexts are displayed in the form of graphical dependencies, and in evaluation tests, the statistical properties are determined by numerical characteristics. As a result, according to the relevant data, a conclusion is made about the success of the passed test. Figures 4 and 5 show data on the number of files that successfully passed the graphical and evaluation tests.

Figure 4 
               Graphical test results.
Figure 4

Graphical test results.

Figure 5 
               Evaluation test results.
Figure 5

Evaluation test results.

In practice, the following approaches to testing lightweight encryption algorithms in software implementation are used:

  1. Microcontroller Benchmarking by NIST LWC team (https://github.com/usnistgov/Lightweight-Cryptography-Benchmarking).

  2. AVR/ARM Microcontroller Benchmarking by Rhys Weatherley (https://rweather.github.io/lightweight-crypto).

  3. AVR/ARM/RISC-V Microcontroller Benchmarking by Sebastian Renner, Enrico Pozzobon, and Jürgen Mottok (https://lwc.las3.de).

  4. RISC-V Benchmarking by Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels, and Benoit Viguier (https://github.com/AsmOptC-RiscV/Assembly-Optimized-C-RiscV).

  5. eBACS (ECRYPT Benchmarking of Cryptographic Systems): General-purpose Processor (Intel, AMD, ARM Cortex-A, Qualcomm) Benchmarking (http://bench.cr.yp.to).

Of all the approaches presented earlier, for testing the developed and other lightweight encryption algorithms, the second option was chosen, i.e., AVR/ARM Microcontroller Benchmarking by Rhys Weatherley.

The developed lightweight encryption algorithm was tested on the ArduinoUnoR3 board.

Main features of ArduinoUnoR3:

  1. Microcontroller – ATmega328;

  2. Clock frequency – 16 MHz;

  3. Operating voltage – 5 V; and

  4. Flash-memory – 32 MB.

The free software Arduino IDE version 2.0.0-rc3 was used as a software shell for compiling and uploading the source code of the developed encryption algorithm to the ArduinoUnoR3 board.

ISL_LBC was developed in the high-level C++ programming language, which allowed us to slightly modify the source code for use in the ArduinoIDE. All necessary source codes and sketches for the study were taken from the corresponding website [7].

Theoretical and experimental tests have shown that the algorithm fully complies with the basic cryptographic requirements. The study of the cryptographic strength of the encryption algorithm will be continued in subsequent works.

5 Conclusion

Based on the tests and studies carried out, it has been established that the proposed LBC-3 encryption algorithm provides a good avalanche effect. According to the results of randomness testing using statistical tests, it was found that the binary sequence obtained after encryption is close to random.

Further work is to investigate other cryptographic properties of this algorithm using various cryptanalysis methods. This lightweight cipher will be implemented in software on different platforms to analyze and evaluate its reliability. Recommendations and calculations for its hardware implementation will also be prepared.

Acknowledgment

The research work was carried out within the framework of the project AP09259570 “Development and study of a domestic lightweight encryption algorithm with limited resources” at the IICT of the RK MES CS.

  1. Conflict of interest: Authors state no conflict of interest.

References

[1] Zhukov AE. Lightweight cryptography. Part 1. Cybersecurity issues, NPO Echelon, Moskow. Vol. 1, 2015. p. 26–43 (in Russian).10.21681/2311-3456-2015-1-26-43Suche in Google Scholar

[2] Zhukov AE. Lightweight cryptography. Part 2. Cybersecurity issues, NPO Echelon, Moskow. Vol. 2, 2015. p. 2–10 (in Russian).Suche in Google Scholar

[3] Kapalova NA, Haumen A, Suleimenov OT. Lightweight cryptographic information protection systems. Proceedings of the International Scientific-Practical Conference Actual Problems of Information Security in Kazakhstan. Almaty; 2021. p. 48–53 (in Russian).Suche in Google Scholar

[4] Kazlauskas K, Kazlauskas J. Key-dependent S-box generation in AES block cipher system. Informatica. 2009;20:23–34.10.15388/Informatica.2009.235Suche in Google Scholar

[5] Preneel B. Perspectives on lightweight cryptography. Inscript: Shanghai, China; October 2010. p. 20–4.Suche in Google Scholar

[6] Kapalova NA, Haumen A, Sakan K. Diffusion properties of linear transformations. Proceedings of the Scientific Conference RK MES IICT Modern Problems of Informatics and Computing Technologies. Almaty; 2020. p. 189–93 (in Russian).Suche in Google Scholar

[7] https://github.com/rweather/arduinolibs.Suche in Google Scholar

Received: 2022-05-13
Revised: 2022-08-23
Accepted: 2022-08-31
Published Online: 2022-10-11

© 2022 Saule Nyssanbayeva et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Artikel in diesem Heft

  1. Regular Articles
  2. Performance of a horizontal well in a bounded anisotropic reservoir: Part I: Mathematical analysis
  3. Key competences for Transport 4.0 – Educators’ and Practitioners’ opinions
  4. COVID-19 lockdown impact on CERN seismic station ambient noise levels
  5. Constraint evaluation and effects on selected fracture parameters for single-edge notched beam under four-point bending
  6. Minimizing form errors in additive manufacturing with part build orientation: An optimization method for continuous solution spaces
  7. The method of selecting adaptive devices for the needs of drivers with disabilities
  8. Control logic algorithm to create gaps for mixed traffic: A comprehensive evaluation
  9. Numerical prediction of cavitation phenomena on marine vessel: Effect of the water environment profile on the propulsion performance
  10. Boundary element analysis of rotating functionally graded anisotropic fiber-reinforced magneto-thermoelastic composites
  11. Effect of heat-treatment processes and high temperature variation of acid-chloride media on the corrosion resistance of B265 (Ti–6Al–4V) titanium alloy in acid-chloride solution
  12. Influence of selected physical parameters on vibroinsulation of base-exited vibratory conveyors
  13. System and eco-material design based on slow-release ferrate(vi) combined with ultrasound for ballast water treatment
  14. Experimental investigations on transmission of whole body vibration to the wheelchair user's body
  15. Determination of accident scenarios via freely available accident databases
  16. Elastic–plastic analysis of the plane strain under combined thermal and pressure loads with a new technique in the finite element method
  17. Design and development of the application monitoring the use of server resources for server maintenance
  18. The LBC-3 lightweight encryption algorithm
  19. Impact of the COVID-19 pandemic on road traffic accident forecasting in Poland and Slovakia
  20. Development and implementation of disaster recovery plan in stock exchange industry in Indonesia
  21. Pre-determination of prediction of yield-line pattern of slabs using Voronoi diagrams
  22. Urban air mobility and flying cars: Overview, examples, prospects, drawbacks, and solutions
  23. Stadiums based on curvilinear geometry: Approximation of the ellipsoid offset surface
  24. Driftwood blocking sensitivity on sluice gate flow
  25. Solar PV power forecasting at Yarmouk University using machine learning techniques
  26. 3D FE modeling of cable-stayed bridge according to ICE code
  27. Review Articles
  28. Partial discharge calibrator of a cavity inside high-voltage insulator
  29. Health issues using 5G frequencies from an engineering perspective: Current review
  30. Modern structures of military logistic bridges
  31. Retraction
  32. Retraction note: COVID-19 lockdown impact on CERN seismic station ambient noise levels
  33. Special Issue: Trends in Logistics and Production for the 21st Century - Part II
  34. Solving transportation externalities, economic approaches, and their risks
  35. Demand forecast for parking spaces and parking areas in Olomouc
  36. Rescue of persons in traffic accidents on roads
  37. Special Issue: ICRTEEC - 2021 - Part II
  38. Switching transient analysis for low voltage distribution cable
  39. Frequency amelioration of an interconnected microgrid system
  40. Wireless power transfer topology analysis for inkjet-printed coil
  41. Analysis and control strategy of standalone PV system with various reference frames
  42. Special Issue: AESMT
  43. Study of emitted gases from incinerator of Al-Sadr hospital in Najaf city
  44. Experimentally investigating comparison between the behavior of fibrous concrete slabs with steel stiffeners and reinforced concrete slabs under dynamic–static loads
  45. ANN-based model to predict groundwater salinity: A case study of West Najaf–Kerbala region
  46. Future short-term estimation of flowrate of the Euphrates river catchment located in Al-Najaf Governorate, Iraq through using weather data and statistical downscaling model
  47. Utilization of ANN technique to estimate the discharge coefficient for trapezoidal weir-gate
  48. Experimental study to enhance the productivity of single-slope single-basin solar still
  49. An empirical formula development to predict suspended sediment load for Khour Al-Zubair port, South of Iraq
  50. A model for variation with time of flexiblepavement temperature
  51. Analytical and numerical investigation of free vibration for stepped beam with different materials
  52. Identifying the reasons for the prolongation of school construction projects in Najaf
  53. Spatial mixture modeling for analyzing a rainfall pattern: A case study in Ireland
  54. Flow parameters effect on water hammer stability in hydraulic system by using state-space method
  55. Experimental study of the behaviour and failure modes of tapered castellated steel beams
  56. Water hammer phenomenon in pumping stations: A stability investigation based on root locus
  57. Mechanical properties and freeze-thaw resistance of lightweight aggregate concrete using artificial clay aggregate
  58. Compatibility between delay functions and highway capacity manual on Iraqi highways
  59. The effect of expanded polystyrene beads (EPS) on the physical and mechanical properties of aerated concrete
  60. The effect of cutoff angle on the head pressure underneath dams constructed on soils having rectangular void
  61. An experimental study on vibration isolation by open and in-filled trenches
  62. Designing a 3D virtual test platform for evaluating prosthetic knee joint performance during the walking cycle
  63. Special Issue: AESMT-2 - Part I
  64. Optimization process of resistance spot welding for high-strength low-alloy steel using Taguchi method
  65. Cyclic performance of moment connections with reduced beam sections using different cut-flange profiles
  66. Time overruns in the construction projects in Iraq: Case study on investigating and analyzing the root causes
  67. Contribution of lift-to-drag ratio on power coefficient of HAWT blade for different cross-sections
  68. Geotechnical correlations of soil properties in Hilla City – Iraq
  69. Improve the performance of solar thermal collectors by varying the concentration and nanoparticles diameter of silicon dioxide
  70. Enhancement of evaporative cooling system in a green-house by geothermal energy
  71. Destructive and nondestructive tests formulation for concrete containing polyolefin fibers
  72. Quantify distribution of topsoil erodibility factor for watersheds that feed the Al-Shewicha trough – Iraq using GIS
  73. Seamless geospatial data methodology for topographic map: A case study on Baghdad
  74. Mechanical properties investigation of composite FGM fabricated from Al/Zn
  75. Causes of change orders in the cycle of construction project: A case study in Al-Najaf province
  76. Optimum hydraulic investigation of pipe aqueduct by MATLAB software and Newton–Raphson method
  77. Numerical analysis of high-strength reinforcing steel with conventional strength in reinforced concrete beams under monotonic loading
  78. Deriving rainfall intensity–duration–frequency (IDF) curves and testing the best distribution using EasyFit software 5.5 for Kut city, Iraq
  79. Designing of a dual-functional XOR block in QCA technology
  80. Producing low-cost self-consolidation concrete using sustainable material
  81. Performance of the anaerobic baffled reactor for primary treatment of rural domestic wastewater in Iraq
  82. Enhancement isolation antenna to multi-port for wireless communication
  83. A comparative study of different coagulants used in treatment of turbid water
  84. Field tests of grouted ground anchors in the sandy soil of Najaf, Iraq
  85. New methodology to reduce power by using smart street lighting system
  86. Optimization of the synergistic effect of micro silica and fly ash on the behavior of concrete using response surface method
  87. Ergodic capacity of correlated multiple-input–multiple-output channel with impact of transmitter impairments
  88. Numerical studies of the simultaneous development of forced convective laminar flow with heat transfer inside a microtube at a uniform temperature
  89. Enhancement of heat transfer from solar thermal collector using nanofluid
  90. Improvement of permeable asphalt pavement by adding crumb rubber waste
  91. Study the effect of adding zirconia particles to nickel–phosphorus electroless coatings as product innovation on stainless steel substrate
  92. Waste aggregate concrete properties using waste tiles as coarse aggregate and modified with PC superplasticizer
  93. CuO–Cu/water hybrid nonofluid potentials in impingement jet
  94. Satellite vibration effects on communication quality of OISN system
  95. Special Issue: Annual Engineering and Vocational Education Conference - Part III
  96. Mechanical and thermal properties of recycled high-density polyethylene/bamboo with different fiber loadings
  97. Special Issue: Advanced Energy Storage
  98. Cu-foil modification for anode-free lithium-ion battery from electronic cable waste
  99. Review of various sulfide electrolyte types for solid-state lithium-ion batteries
  100. Optimization type of filler on electrochemical and thermal properties of gel polymer electrolytes membranes for safety lithium-ion batteries
  101. Pr-doped BiFeO3 thin films growth on quartz using chemical solution deposition
  102. An environmentally friendly hydrometallurgy process for the recovery and reuse of metals from spent lithium-ion batteries, using organic acid
  103. Production of nickel-rich LiNi0.89Co0.08Al0.03O2 cathode material for high capacity NCA/graphite secondary battery fabrication
  104. Special Issue: Sustainable Materials Production and Processes
  105. Corrosion polarization and passivation behavior of selected stainless steel alloys and Ti6Al4V titanium in elevated temperature acid-chloride electrolytes
  106. Special Issue: Modern Scientific Problems in Civil Engineering - Part II
  107. The modelling of railway subgrade strengthening foundation on weak soils
  108. Special Issue: Automation in Finland 2021 - Part II
  109. Manufacturing operations as services by robots with skills
  110. Foundations and case studies on the scalable intelligence in AIoT domains
  111. Safety risk sources of autonomous mobile machines
  112. Special Issue: 49th KKBN - Part I
  113. Residual magnetic field as a source of information about steel wire rope technical condition
  114. Monitoring the boundary of an adhesive coating to a steel substrate with an ultrasonic Rayleigh wave
  115. Detection of early stage of ductile and fatigue damage presented in Inconel 718 alloy using instrumented indentation technique
  116. Identification and characterization of the grinding burns by eddy current method
  117. Special Issue: ICIMECE 2020 - Part II
  118. Selection of MR damper model suitable for SMC applied to semi-active suspension system by using similarity measures
Heruntergeladen am 10.12.2025 von https://www.degruyterbrill.com/document/doi/10.1515/eng-2022-0372/html
Button zum nach oben scrollen