The aim of this study was to evaluate the effects of noise exposure in certain residential districts in Fallujah city. Twenty-nine stations were selected and divided into two groups; the first group was located 50 to 100 metres from the main streets (quiet areas), whilst the second was located directly on the main streets. Noise levels were measured at a rate of three readings per station for different time periods for approximately sixty days in the year 2020. Mean values were taken in both the morning and evening using a portable sound level meter (Auto range, RS-232). The highest noise level was measured at Alforkan station for the morning reading (83.8 dB) within the second group, while the lowest noise level was measured at Alshohada alawla district station for the morning reading (63.2 dB) within the first group. As for the results of the daily noise level in the evening, the highest daily average (79.4 dB) was measured at Jaish al Shabi street, while the lowest daily average (56.4 dB) was at Dor Alsekak district. The total average noise levels for the morning measurements for the first and second groups were 66.7 dB and 77.2 dB, respectively, whereas those for evening measurements were 65.3 dB and 71.7 dB, respectively. According to field measurements, the average values for the noise (traffic) for the first and second groups in the morning and afternoon exceeded 68 dB, which may cause people to feel very disturbed according to the WHO guidelines on exposure to external environmental noise. In general, all the results measured in this study are above the limits allowed both locally and internationally. This is due to certain erroneous practices in daily activities in addition to the irregular spread of electric generators and commercial activities as well as heavy traffic in the city.
Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreThe study of cuneiform texts is very important for finding out the ancient history of Iraq and its civilization, as well as the close relation among languages, especially Semitic, the mother language to which both Akkadian and Arabic belong, the matter that clarifies the linkage among them. The Akkadian language is among these Jazri (a Semitic branch) languages, besides Arabic. It is the most ancient one. It consisted of a lot of genuine linguistic rules derived from the mother Jazri language. Contrastive Akkadian studies approved these linguistic rules. Due to the close linkage that relates Akkadian language to its sister Arabic , as they both relate to the same family, the researcher an verbs and compared them with studied aspects and moo
... Show MoreThe effect of the initial pressure upon the laminar flame speed, for a methane-air mixtures, has been detected paractically, for a wide range of equivalence ratio. In this work, a measurement system is designed in order to measure the laminar flame speed using a constant volume method with a thermocouples technique. The laminar burning velocity is measured, by using the density ratio method. The comparison of the present work results and the previous ones show good agreement between them. This indicates that the measurements and the calculations employed in the present work are successful and precise
Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreThe concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.
The emergence of the Internet and its transformation in the early nineties of the last century led to a means of mass communication that brought about significant structural changes in the media map.
Over the course of historical development, the public did not engage the media in its behavior in the implementation and dissemination of an idea, generalization or theory put forward by media experts or practitioners through these means to do it. Blogs represent the most important service provided by the Internet in recent years which has gained special importance in the media field. Where the word “Blogs” has several names: (alternative media), (blogging press), (popular press) and other names.
The medi
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreSteganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show More