In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperforms the two other methods in its estimations for different noise conditions.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreThis research is based on interaction of two most important variables to the business organizations in the current era , these two variables are (marketing orientation and quality of service), this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample
... Show MoreReishi Mushroom, Ganoderma, is considered one of important wood-decaying medicinal mushrooms. This study aimed to identify three samples of this genus in Mosul city in February and April 2019. Three species of Ganoderma were collected from three various trees including Eucalyptus, Morus, and Olea (olive) in Mosul City, Northern Iraq. Their identifications and their DNA sequences were genetically identified by using PCR techniques according to detect nuclear ribosomal internal transcribed spacer (ITS) regions. Results exhibited the finding of Ganoderma resinaceum, Ganoderma applanatum, and Ganoderma sp. This study is first attempt to identify Reishi Mushroom by molecular methods in Iraq. Thus, the current study is considered new good d
... Show MoreThe present work represents description of three new species of genus Anthrenus
Geoffory from Iraq, these are : A. aradensis sp. nov., A. fabrici sp. nov. and A.
unicolor sp. nov. Locality, host plants and date of collection were given.
Objective(s): To assess the effect of removable partial dentures on the abutment teeth in comparison with that of the
remaining dentition, and to investigate the effect of regular check up on periodontal health for patients using this
type of prosthesis.
Methodology: One hundred patients wearing removable partial dentures for at least three years included in the
study. Teeth used as direct or in direct retainers for the removable partial denture were considered as the study
group, while the remaining dentition in the same jaw was considered as the control group. The following periodontal
parameters were registered for each tooth, plaque and gingival indices, clinical attachment level and tooth mobility.
Patients were
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More