Preferred Language
Articles
/
ijs-3918
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 31 2018
Journal Name
The Open Electrical & Electronic Engineering Journal
Minimum Delay Congestion Control in Differentiated Service Communication Networks
...Show More Authors

This paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
FLUTTER SPEED LIMITS OF SUBSONIC WINGS
...Show More Authors

Flutter is a phenomenon resulting from the interaction between aerodynamic and structural dynamic forces and may lead to a destructive instability. The aerodynamic forces on an oscillating airfoil combination of two independent degrees of freedom have been determined. The problem resolves itself into the solution of certain definite integrals, which have been identified as Theodorsen functions. The theory, being based on potential flow and the Kutta condition, is fundamentally equivalent to the conventional wing-ection theory relating to the steady case. The mechanism of aerodynamic instability has been analyzed in detail. An exact solution, involving potential flow and the adoption of the Kutta condition, has been analyzed in detail. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 18 2018
Journal Name
Journal Of Engineering And Applied Sciences
Performance Evaluation of Transport Protocols for Mobile Ad Hoc Networks
...Show More Authors

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10

... Show More
View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem
...Show More Authors

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON Weak g *sD -Sets And Associative Separation Axioms
...Show More Authors

   In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
 

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Review of Challenges and Solutions for Genomic Data Privacy-Preserving
...Show More Authors

     The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use of Logistic Regression Model in Estimating the Probability of Being Affected By Breast Cancer Based On the Levels of Interleukins and Cancer Marker CA15-3
...Show More Authors

Breast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Quality of Experience Metric of Streaming Video: A survey
...Show More Authors

Technological development in the last years leads to increase the access speed in the internet networks that allow a huge number of users watching videos online.

     Video streaming important type in the real-time video sessions and one of the most popular applications in networking systems.  The Quality of Service (QoS) techniques give us indicate to the effect of multimedia traffic on the network performance, but this techniques do not reflect the user perception. Using QoS and Quality of Experience (QoE) together can give guarantee to the distribution of video content according to video content characteristics and the user experience .

     To measure the users’ perceptio

... Show More
View Publication Preview PDF