With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
This paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the slid
... Show MoreThe research aims to shed light on the possibility of measuring the intellectual capital in the Iraqi insurance company using accounting models, as well as disclosing it in the financial statements of the company, where human capital was measured using the present value factor model for discounted future revenues and the intellectual value-added factor model for measuring structural capital It was also disclosed in the financial statements based on the theory of stakeholders. The research problem lies in the fact that the Iraqi insurance company does not carry out the process of measuring and disclosing the intellectual capital while it is considered an important source for the company’s progress in the labor market recently. T
... Show MoreMethylotrophs bacteria are ubiquitous, and they have the ability to consume single carbon (C1) which makes them biological conversion machines. It is the first study to find facultative methylotrophic bacteria in contaminated soils in Iraq. Conventional PCR was employed to amplify MxaF that encodes methanol dehydrogenase enzyme. DNA templates were extracted from bacteria isolated from five contaminated sites in Basra. The gene specific PCR detected Methylorubrum extorquens as the most dominant species in these environments. The ability of M. extorquens to degrade aliphatic hydrocarbons compound was tested at the laboratory. Within 7 days, gas chromatographic (GC) studies of remaining utilize
... Show MoreDue to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreA new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution
A Multiple System Biometric System Based on ECG Data