ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreBackground: A review of articles of method in treating compound phalangeal fractures by using mini-external fixator, elaborating the anatomy, mechanics, modalities of treatment, and complications of these types of fractures. Also, it compares between different studies regarding the functional results and final outcome. External fixation of phalangeal fractures is a good method for osteo synthesis in certain situations. The simplicity of the surgical procedure and the minimal disruption of the normal bone architecture also make it appealing.Objectives: Evaluating the functional results of the use of mini-external fixator for the treatment of compound fractures of phalangeal bones of the hand.Method: Our study consists of 15 patients, 12 w
... Show MoreThe aim of this research is to solve a real problem in the Department of Economy and Investment in the Martyrs establishment, which is the selection of the optimal project through specific criteria by experts in the same department using a combined mathematical model for the two methods of analytic hierarchy process and goal programming, where a mathematical model for goal programming was built that takes into consideration the priorities of the goal criteria by the decision-maker to reach the best solution that meets all the objectives, whose importance was determined by the hierarchical analysis process. The most important result of this research is the selection of the second pro
... Show MoreBackground: A review of articles of method in treating compound phalangeal fractures by using mini-external fixator, elaborating the anatomy, mechanics, modalities of treatment, and complications of these types of fractures. Also, it compares between different studies regarding the functional results and final outcome. External fixation of phalangeal fractures is a good method for osteo synthesis in certain situations. The simplicity of the surgical procedure and the minimal disruption of the normal bone architecture also make it appealing. Objectives: Evaluating the functional results of the use of mini-external fixator for the treatment of compound fractures of phalangeal bones of the hand. Method: Our study consists of 15 patients, 12 we
... Show MoreThe Moisture damage is considered as one of the main challenge for the experts in the field of asphalt pavement design. The aims of the present study is to modify moisture resistance of the asphalt concrete by utilizing ceramic fibers as a type of reinforcement incorporated with hydrated lime. For this purpose, a penetration grade of the asphalt cement (40-50) was utilized as a binder with an aggregate of the maximum nominal size of 12.5mm and mineral filler limestone dust. A series of specimens has been fabricated by utilizing 0.50, 1.0, 1.5, and 2.0 percentages of ceramic fibers. For each of these contents, another subsequent group of specimens with hydrated lime with 0.0, 1.0, 1.5, and 2.0 percentages were moulded. For the additi
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreA system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More