Preferred Language
Articles
/
rRZ_l4cBVTCNdQwC1VfG
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Sep 15 2019
Journal Name
Route Education And Social Science Journal
The influence of textual and visual reading on EFL Iraqi students' comprehension
...Show More Authors

Reading roles as the third skill in the range of English as a Foreign Language (EFL) learning. Although the capability of reading in both academic and non-academic texts is assessed on standardized tests, few of oral interpretation of written language excludes images from estimating literary knowledge. This paper highlights strategies of reading comprehension and visual literacy. It aims to investigate either textual or visual reading in EFL can make an impact on students' comprehension. The effective use of visuals changes instructing reading comprehension recently.The imagery-text model can affect developing reading comprehension and enhancing intellectual thinking. The study hypothesizes that there is no relationship between reading and

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimation of SNR Including Quantization Error of Multi-Wavelength Lidar Receiver
...Show More Authors

 This paper comprises the design and operation of mono-static backscatter lidar station based on a pulsed Nd: YAG laser that operates at multiple wavelengths. The three-color lidar laser transmitter is based on the collinear fundamental 1064 nm, second harmonic 532 nm and a third harmonic 355nm output of a Nd:YAG laser. The most important parameter of lidar especially daytime operations is the signal-to-noise ratio (SNR) which gives some instructions in designing of lidar and it is often limit the effective range. The reason is that noises or interferences always badly affect the measured results. The inversion algorithms have been developed for the study of atmospheric aerosols. Signal-to-noise ratio (SNR) of three-color channel re

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
A Study of the effect of adding antimony oxide to the coating surfaces of steel and cast Iron by glass
...Show More Authors

The study included adding antimony oxide to mixtures of coating metal surfaces (Enameling), after it was selected ceramic materials used in the coating metal pieces of the type of steel and cast iron in two layers. The first is called a ground coat and the second is a cover coat.
Ceramic materials layer for ground coat have been melted down in
platinum crucible at a temperature of 1200oC to prepare the glass
mixture (Frit). It was coated on metals at a temperature of 780oC for
two minutes, while the second layer was prepared glass mixture
(Frit) at a temperature of 1200oC, but was coated at a temperature of
760oC for two minutes.
Underwent tests crystalline state of powders (Frits) and enameled samples using X-ray di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 25 2021
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Survey paper on Lossy Audio Compression Methods
...Show More Authors

During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.

View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Obstacles to development in the field of education
...Show More Authors

Education is the most powerful and important weapon in fighting poverty and unemployment because it provides students with new skills that appropriate the new market requirements and fair distribution of natural resources. It also transfers knowledge, skills, and ethics over generations. Education aims to create effective leaders who go under training and rehabilitation process, create a new human and instill faith, generate the creativity and innovation, and keep abreast with scientific process, updating curriculum, and finally, applying the technical education

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
BIODEGRADATION OF POLYSTYRENE BY PLASTIVORES GREATER WAXWORMS LARVAE (Galleria mellonella).
...Show More Authors

This study was aimed to find and test biological methods for reducing the aggregation of plastics such as PS in the environment  and study the ability of Greater Wax worms larvae (Galleria mellonella) to eat PS that similar in the its structure to beeswax .Weight loss, morphology changes ,FTIR spectroscopy  and GC-mass analysis were performed which showed changes in chemical properties of the PS due to degradation. In this study  the percentage of weight loss was 33% in the PS treated with G. mellonella. FTIR of PS frass showed the disappearance of aromatic cycle band that was found in the origin PS at region more than 3000 cm-1. Also The PS frass samples from wax worms larvae revealed the creation of a new O-H stretching alcohol

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More