The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achieving the synchronization.
Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreThe research aims to analyze the impact of exchange rate fluctuations (EXM and EXN) and inflation (INF) on the gross domestic product (GDP) in Iraq for the period 1988-2020. The research is important by analyzing the magnitude of the macroeconomic and especially GDP effects of these variables, as well as the economic effects of exchange rates on economic activity. The results of the standard analysis using the ARDL model showed a long-term equilibrium relationship, according to the Bound Test methodology, from explanatory (independent) variables to the internal (dependent) variable, while the value of the error correction vector factor was negative and moral at a level less than (1%). The relationship bet
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreShort Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato
... Show MoreThe research aims to measure the accounting conservatism practice of listed companies in the Iraq stock exchange using Basu model to measure the degree of accounting conservatism in a sample of companies of (21) companies for the period from 2007 to 2011, the researcher found that most of the listed companies in the market exercised accounting conservatism when measurement and disclosure of the result of the activity and financial position and there is a variation in the degree of accounting conservatism between economic sectors , which included banking , investment , insurance , industry , agriculture , tourism and hotels.
Because the practice of accounting conservatism properly
... Show More