A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalence (L) of the sequence of period (p) when (L) is greater than (p/2). Several examples are given for conciliated the accuracy of the results of this proposed method.
the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Quantitative analysis of human voice has been subject of interest and the subject gained momentum when human voice was identified as a modality for human authentication and identification. The main organ responsible for production of sound is larynx and the structure of larynx along with its physical properties and modes of vibration determine the nature and quality of sound produced. There has been lot of work from the point of view of fundamental frequency of sound and its characteristics. With the introduction of additional applications of human voice interest grew in other characteristics of sound and possibility of extracting useful features from human voice. We conducted a study using Fast Fourier Transform (FFT) technique to analy
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsiferous soi
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsiferous soi
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsife
... Show MoreMost frequently used models for modeling and forecasting periodic climatic time series do not have the capability of handling periodic variability that characterizes it. In this paper, the Fourier Autoregressive model with abilities to analyze periodic variability is implemented. From the results, FAR(1), FAR(2) and FAR(2) models were chosen based on Periodic Autocorrelation function (PeACF) and Periodic Partial Autocorrelation function (PePACF). The coefficients of the tentative model were estimated using a Discrete Fourier transform estimation method. FAR(1) models were chosen as the optimal model based on the smallest values of Periodic Akaike (PAIC) and Bayesian Information criteria (PBIC). The residual of the fitted models was diagn
... Show MoreThe aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More Today, the use of iris recognition is expanding globally as the most accurate and reliable biometric feature in terms of uniqueness and robustness. The motivation for the reduction or compression of the large databases of iris images becomes an urgent requirement. In general, image compression is the process to remove the insignificant or redundant information from the image details, that implicitly makes efficient use of redundancy embedded within the image itself. In addition, it may exploit human vision or perception limitations to reduce the imperceptible information.
This paper deals with reducing the size of image, namely reducing the number of bits required in representing the