Preferred Language
Articles
/
ijs-801
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications
...Show More Authors

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Impact of different types of storage media on enamel surface roughness and granularity distribution of avulsed teeth (In vitro study)
...Show More Authors

Background: To investigate the effect of different types of storage media on enamel surface microstructure of avulsed teeth by using atomic force microscope.Materials and methods : Twelve teeth blocks from freshly extracted premolars for orthodontic treatment were selected . The study samples were divided into three groups according to type of storage media :A-egg white , B- probiotic yogurt , and C-bovine milk . All the samples were examined for changes in surface roughness and surface granularity distribution  using atomic force microscope, at two periods: baseline, and after 8 hours of immersing in the three types of storage media. Results: Milk group had showed a significant increase in the mean of the  roughness values at

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
National security and human security concepts in the study
...Show More Authors

Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Design and Implementation of a Microstrip Six-Port Reflectometer (SPR) with Enhanced Bandwidth
...Show More Authors

A compact microstrip six-port reflectometer (SPR) with extended bandwidth is proposed in this paper. The design is based on using 16-dB multi-section coupled line directional couplers and a multi-section 3-dB Wilkinson power divider operating from 1 to 6 GHz. The proposed SPR employs only two calibration standards: a matched load and an open load. As compared to other dielectric substrates, fabricating the proposed SPR involves using a low-cost (FR4) substrate. A novel algorithm is also proposed to estimate the complex reflection coefficient over the frequency ranges at which the standard performance of the circuit components is not fully satisfied. The new algorithm is based on the circles’ intersection points, which have been de

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
The Effecting of Human Body on Slotted Monopole Antenna in Wearable Communications
...Show More Authors

In this paper, the characteristics of microstrip monopole antennas are studied firstly in free space. Secondly, the effects of the human body on the studied antenna's performance are investigated for wearable communications. Different patch shapes of microstrip monopole antenna are chosen to operate at two bands: industrial scientific and medical band (ISM) and ultra-wideband (UWB) for wearable applications. The studied antenna consists of a radiating element on one side of the substrate and a partial ground plane on the other side. The antenna is supposed to fabricate on cloth fabric whose relative dielectric constant is Ɛr =1.7. At the same time, the pure copper could be used as the conducting part representing both t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Chaos synchronization delay in semiconductor lasers with optoelectronic feedback
...Show More Authors

In this work we reported the synchronization delay in
semiconductor laser (SL) networks. The unidirectional
configurations between successive oscillators and the correlation
between them are achieved. The coupling strength is a control
parameter so when we increase coupling strength the dynamic of the
system has been change. In addition the time required to synchronize
network components (delay of synchronization) has been studied as
well. The synchronization delay has been increased by mean of
increasing the number of oscillators. Finally, explanation of the time
required to synchronize oscillators in the network at different
coupling strengths.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF