Preferred Language
Articles
/
ijp-200
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
The Effect of the Five Fingers Strategy and Traffic Signals Strategy on Physics First Grade Intermediate School Students' Achievement and Personal Intelligence
...Show More Authors

The aim of this research is to know the effect of two strategies of active learning, the five fingers and traffic signals, on the first grade intermediate level student's achievement and personal intelligence. The research sample was chosen from the Al- Mansour intermediate school for boys, including (101) students divided into three groups chosen randomly which represented the first experimental group (32) students, the second experimental group (34) students, and the control group (33) students. To achieve the research aims, the research prepared a physics achievement test containing (26) items, and a personal intelligence test containing (20) items. The psychometric characteristics, of the tests were checked up the following results were

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
An Autocorrelative Approach for EMG Time-Frequency Analysis
...Show More Authors

As they are the smallest functional parts of the muscle, motor units (MUs) are considered as the basic building blocks of the neuromuscular system. Monitoring MU recruitment, de-recruitment, and firing rate (by either invasive or surface techniques) leads to the understanding of motor control strategies and of their pathological alterations. EMG signal decomposition is the process of identification and classification of individual motor unit action potentials (MUAPs) in the interference pattern detected with either intramuscular or surface electrodes. Signal processing techniques were used in EMG signal decomposition to understand fundamental and physiological issues. Many techniques have been developed to decompose intramuscularly detec

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor (Q)
...Show More Authors

Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 30 2016
Journal Name
International Business Management
ESTIMATE OF THE MULTIPLIER EFFECT OF THE MONETARY AND FISCAL POLICY ON NON-OIL GROSS DOMESTIC PRODUCT IN THE IRAQI ECONOMY FOR THE PERIOD OF 1990-2014
...Show More Authors

The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to

... Show More
Preview PDF