Preferred Language
Articles
/
ijs-3918
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed method to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Genotyping of fusA Gene from Clinical Isolates Acinetobacter baumannii in Baghdad
...Show More Authors

This study aims at detecting the differences in genotyping of coding region fusA gene in clinical isolates of Acinetobacter baumannii from Baghdad, Iraq. Collected two hundred clinical samples (50 samples from urine, 50 samples from wound, 50 samples from sputum and 50 samples from otitis infections). Laboratory diagnosis for bacterial isolates carried out by some biochemical tests and confirmed by using VITEK- 2 compact system. The results appeared that twenty isolates of Acinetobacter baumannii in all these samples. Genotyping study was performed of coding region fusA gene of the extracted genome of all bacterial isolates and used specific primers in achieved amplification process of this target gene. DNA sequencing of this gene and alig

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Human Gene
Association of CTLA-4 (+49A/G) polymorphism and susceptibility of developing rheumatoid arthritis in an Iraqi Arab population
...Show More Authors

Background: The gene responsible for encoding the protein of cytotoxic T lymphocyte-associated antigen-4 (CTLA-4) has been found to be associated with rheumatoid arthritis (RA) in different ethnic populations. But the association of +49A/G CTLA-4 polymorphism with susceptibility of RA among Iraqi Arab populations has not yet been determined. Methods: One hundred and seventy-eight patients were examined, 67 of them were males (mean age 54.71 ± 10.4 years), while 167 were examined for the control group, of whom 64 were males and the rest were females. CTLA-4 DNA genotyping was carried on to determine the +49 A/G (rs231775) polymorphism using a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP). Enzyme-linked immuno

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
The The Resolution of Weyl Module for Two Rows in Special Case of the Skew-Shape
...Show More Authors

     The aim of this work is to survey the two rows resolution of Weyl module and locate the terms and the exactness of the Weyl Resolution in the case of skew-shape (8,6)/(2,1).

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A Study of Some of the Indicators of Noise Pollution in Certain Residential Districts in Fallujah City
...Show More Authors

     The aim of this study was to evaluate the effects of noise exposure in certain residential districts in Fallujah city. Twenty-nine stations were selected and divided into two groups; the first group was located 50 to 100 metres from the main streets (quiet areas), whilst the second was located directly on the main streets. Noise levels were measured at a rate of three readings per station for different time periods for approximately sixty days in the year 2020. Mean values were taken in both the morning and evening using a portable sound level meter (Auto range, RS-232). The highest noise level was measured at Alforkan station for the morning reading (83.8 dB) within the second group, while the lowest noise level

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Use of Multi-Response Logistic Regression to Determine the Factors Affecting the Radiation Values of Light-Curing Units in Private Dental Clinics in Erbil
...Show More Authors

     This study aims to determine the exposure of dentists to radiation resulting from the use of light therapy units and to assess their risk and impact on dental clinics.  This study was conducted in private dental clinics in the city of Erbil in northern Iraq. Surveys were conducted to collect information about light-curing units. The results were analysed using the multi-response logistic regression to determine the factors affecting the radiation values of light-curing units. The results of the study showed that five major variables have a major effect by radiation.  This is shown with a value of P ≤ 0.05. Typical treatment times with radiant light, with a typical number of daily restorations, may exceed the risk limits for

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Allergic Rhinitis and Asthma: A Profile of Beta-defensins in Serum of Iraqi Patients
...Show More Authors

Human beta-defenses (hBDs) are antimicrobial peptides involved in innate immune protection, and their association with the risk of respiratory allergy has been proposed. Therefore, this study sought to evaluate this association in allergic rhinitis (AR) and asthma (AS) of Iraqi patients. A case-control study was conducted to investigate serum levels of hBD1, hBD2, hBD3, and hBD4 in 52 AR and 60 AS patients and 61 healthy controls (HC). The hBDs were determined using enzyme-linked immunosorbent assay kits. Results revealed that median levels of hBD1, hBD2, and hBD3 were significantly elevated in the serum of AR and AS patients compared with HC (p < 0.01). Levels of hBD4 were also elevated in AR and AS patients but the differen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between Methods of Laplace Estimators and the Robust Huber for Estimate parameters logistic regression model
...Show More Authors

The logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .                                                

The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result.    &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref