A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreMammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo
... Show MoreFH Ghanim, Journal of Global Pharma Technology, 2018
Some azo compounds were prepared by coupling the diazonium salts of amines with 2,4-dimethylphenol The structure of azo compounds were determined on the basis of elemental analyses, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Complexes of nickel(II) and copper(II) have been synthesized and characterized. The composition of complexes has been established by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity magnetic susceptibility measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). High molar absorbtivity of the complex solutions were observ
... Show MoreRandom matrix theory is used to study the chaotic properties in nuclear energy spectrum of the 24Mg nucleus. The excitation energies (which are the main object of this study) are obtained via performing shell model calculations using the OXBASH computer code together with an effective interaction of Wildenthal (W) in the isospin formalism. The 24Mg nucleus is assumed to have an inert 16O core with 8 nucleons (4protons and 4neutrons) move in the 1d5/2, 2s1/2 and 1d3/2 orbitals. The spectral fluctuations are studied by two statistical measures: the nearest neighb
In this rescrch,new mixed ligand Schiff base complexes of Mn(II),Co(II),Ni(II),Cu(II), Cd(II), and Hg(II) are formulated from the Schiff base( L)resulting from o-phathalaldehyde(o-PA) with p-nitroaniline(p-NA)as a primary ligand and anthranilic acid as a subordinate ligand. Diagnosis of prepared Ligand and its complexes is done by spectral methods mass spectrometer;1H -NMR for ligand Schiff base FTIR, UV-Vis, molar conductance, elemental microanalyses, atomic absoption and magnetic susceptibility. The analytical studies for the all new complexes have shown octahedral geometries. The study of organicperformance of ligand Schiff base and its complexes show various activity agansit four type of bactria two gram (+) and two gram (-) .