Preferred Language
Articles
/
cBigZpgBVTCNdQwC3LzB
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the shuffled audio to yield the cipher audio. The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files, as mono and stereo audio files with large sizes up to 122 MB, different sample rates 22,050, 44,100, 48,000, and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB. The results show high Mean Square Error (MSE), low Signal-to-Noise Ratio (SNR), spectral distortion, 100% Number of Sample Change Rate (NSCR), high Percent Residual Deviation (PRD), low Correlation Coefficient (CC), large key space 2616, high sensitivity to a slight change in the secret key and that it can counter several attacks, namely brute force attack, statistical attack, differential attack, and noise attack.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Demonstratives in English and Arabic : A Contrastive Study
...Show More Authors

This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.

View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
مكتب نور الحسن للنشر والتوزيع
Practical Education and Field Application: A Methodological Vision"
...Show More Authors

Preview PDF
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Design and evalution of a solar PV system
...Show More Authors

PV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building   220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Investigation of Lacidipine as a Nanoemulsions
...Show More Authors

Many pharmaceutical molecules have solubility problems that until yet consist a hurdle that restricts their use in the pharmaceutical preparations. Lacidipine (LCDP) is a calcium-channel blocker with low aqueous solubility and bioavailability.

        Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE)  is one of the popular methods that has been used to solve the solubility problems of many drugs. LCDP was formulated as a NE utilizing triacetin as an oil phase, tween 80 and tween 60 as a surfactant and ethanol as a co-surfactant. Nine formulas were prepared, and different tests performed to ensure the stability of the NEs, such as thermodyna

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (10)
Scopus Crossref