Preferred Language
Articles
/
cBigZpgBVTCNdQwC3LzB
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the shuffled audio to yield the cipher audio. The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files, as mono and stereo audio files with large sizes up to 122 MB, different sample rates 22,050, 44,100, 48,000, and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB. The results show high Mean Square Error (MSE), low Signal-to-Noise Ratio (SNR), spectral distortion, 100% Number of Sample Change Rate (NSCR), high Percent Residual Deviation (PRD), low Correlation Coefficient (CC), large key space 2616, high sensitivity to a slight change in the secret key and that it can counter several attacks, namely brute force attack, statistical attack, differential attack, and noise attack.

Crossref
View Publication
Publication Date
Tue Oct 01 2024
Journal Name
Desalination And Water Treatment
Green power generation from the Tigris River using pressure retarded osmosis process
...Show More Authors

Sustainability including renewable energy and green power, is one of the important feature in recent years due to environmental constraints and the emission of CO2 from fossil fuel. Pressure retarded osmosis (PRO) process is considered one of the effective technology for power generation. This study assessed the application of pressure retarded osmosis to produce power from Tigris River water in Baghdad City, Iraq. Spiral wound TFC membrane was tested in the PRO process with different variables. The effect of different types of draw solutions (MgCl2, NaCl, Sodium Formate, KCl, Sodium Acetate), applied pressure (0 – 7 bar), and draw solution concentration (0.08 and 0.4 M) were tested in this work. The flux, recovery, and power density for

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
POWER GENERATION FROM “PRO” PROCESS USING FLAT SHEET TFC–ULP KOCH MEMBRANES
...Show More Authors

The production of power using the process of pressure–retarded osmosis (PRO) has been studied both experimentally and theoretically for simulated sea water vs. river water and deionized water under two cases: the first is for simulated real conditions of sea water and river water and second under low brine solution concentration to examine the full profile of the power- pressure. The influence of concentration polarization (CP) on water flux has been examined as well.

View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Baysian and NonBaysian Methods to Estimate the two parameters of Logistic Distribution
...Show More Authors

In this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MAGNETO HYDRODYNAMIC NATURAL CONVECTION FLOW ON A VERTICAL CYLINDER WITH A PRESENCE OF HEAT GENERATION AND RADIATION
...Show More Authors

The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Nov 21 2022
Journal Name
College Of Islamic Sciences
Sources of audio images in the poetry of the Islamic
...Show More Authors

      الحمدُ للهِ رب العالمين ، والصلاة والسلام على نبيه الأمين محمد r وعلى آله الطيبين الطاهرين ، وأصحابه الغر الميامين:

             تعد الصورة السمعية مفهوما بيانيا نجده في البلاغة العربية واضحاً مؤثرا، مؤديا دورا جوهريا في إيصال الفكرة التي يروم الأديب إيصالها إلى المتلقي   ولا تبدو السمعية واضحة إلاّ إذا نظر إليها في حالة أدبيه تهز كيان الشاعر &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Water Flow Visualization And Velocity Measurement Using Hydrogen Bubble Generation Technique In Low Speed Open Channel
...Show More Authors

Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Effect of Ferric Oxide on Electricity Generation and Waste Water Treatment Using Microbial Fuel Cell Technology
...Show More Authors

The aim of research is to show the effect of Ferric Oxide (Fe2O3) on the electricity production and wastewater treatment, since 2.5% of Ferric Oxide (Fe2O3) (heated and non heated) nanoparticles has been used. Characterization of nanoparticles was done using X-ray Diffraction (XRD) and Scan Electron Microscopy (SEM). The influence of acidity was also studied on both wastewater treatmenton the Chemical Oxygen demand (COD) and Biological Oxygen Demand (BOD) and voltage output was studied. From the results, it was infused that the dosage of 0.025 g/l and an initial pH 7 were founded to be optimum for the effective degradation of effluents. The results concluded that the treatment of anaerobic sludge wastewater using Ferric Oxide (Fe2O3) in

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF