Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759943
A. Humaidi, M. Fadhel
This paper presents the performance comparison for lane detection and tracking using two techniques; Hough transform and color thresholding. Hough transform includes the following steps: gray scale conversion, edge detection, Hough space accumulation and un-Hough step to draw line. Color thresholding algorithm comprises color thresholding, morphology filtering and drawing tracking label. The results showed that Hough transform technique outperforms color technique in terms of reliability, efficiency and speed of code implementation. Both techniques are coded using MATLAB R2010b.
{"title":"Performance comparison for lane detection and tracking with two different techniques","authors":"A. Humaidi, M. Fadhel","doi":"10.1109/AIC-MITCSA.2016.7759943","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759943","url":null,"abstract":"This paper presents the performance comparison for lane detection and tracking using two techniques; Hough transform and color thresholding. Hough transform includes the following steps: gray scale conversion, edge detection, Hough space accumulation and un-Hough step to draw line. Color thresholding algorithm comprises color thresholding, morphology filtering and drawing tracking label. The results showed that Hough transform technique outperforms color technique in terms of reliability, efficiency and speed of code implementation. Both techniques are coded using MATLAB R2010b.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"102 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759948
H. Alhattab, Mahir A. Albaghdadi, Raed S. Hashim, Ali H. Ali
Different geometrical pattern of micro pin fins heat sinks for TO-220 power transistor has been modeled by using academic edition of multi-physics computational fluid dynamic (CFD) package COMSOL v 4.4 to enhance the heat transfer of power transistor. To Comparing COMSOL model results with experimental results, thermocouples sensors (type: FLUKE 87V, USA) and infrared camera (FLIR E50) were used. Experimental results showed that the model of this work has a high reliability. The assembled micro pin fins heat sinks modeled to the power transistor provides an efficient and economical improvement in thermal transferring, around 11.6oC has been reduced by modeling a heat sink with square, rectangular and hydrofoil micro pin fins compared to smooth heat sink.
利用多物理场计算流体动力学(CFD)软件包学术版COMSOL v 4.4对to -220功率晶体管微引脚翅片散热器的不同几何形状进行了建模,以增强功率晶体管的传热能力。为了比较COMSOL模型结果与实验结果,采用热电偶传感器(型号:FLUKE 87V,美国)和红外摄像机(FLIR E50)。实验结果表明,该模型具有较高的可靠性。模拟功率晶体管的装配微针翅散热器提供了高效和经济的热传递改进,与光滑散热器相比,通过建模方形,矩形和水翼型微针翅散热器降低了约11.6℃。
{"title":"Design of micro heat sink for power transistor by using CFD","authors":"H. Alhattab, Mahir A. Albaghdadi, Raed S. Hashim, Ali H. Ali","doi":"10.1109/AIC-MITCSA.2016.7759948","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759948","url":null,"abstract":"Different geometrical pattern of micro pin fins heat sinks for TO-220 power transistor has been modeled by using academic edition of multi-physics computational fluid dynamic (CFD) package COMSOL v 4.4 to enhance the heat transfer of power transistor. To Comparing COMSOL model results with experimental results, thermocouples sensors (type: FLUKE 87V, USA) and infrared camera (FLIR E50) were used. Experimental results showed that the model of this work has a high reliability. The assembled micro pin fins heat sinks modeled to the power transistor provides an efficient and economical improvement in thermal transferring, around 11.6oC has been reduced by modeling a heat sink with square, rectangular and hydrofoil micro pin fins compared to smooth heat sink.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759941
S. Sadkhan, Hussein Ali
Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted information, Based on chaotic maps, this paper provides a new proposed speech scrambling system based on using a hybrid use of different chaotic maps Logistic and Henon. Each chaotic map will generate key that will be used in speech scrambling. the comparison of the system with normal speech scrambler based on using only one chaotic map. Shows good level of security.
{"title":"A proposed speech scrambling based on hybrid chaotic key generators","authors":"S. Sadkhan, Hussein Ali","doi":"10.1109/AIC-MITCSA.2016.7759941","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759941","url":null,"abstract":"Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted information, Based on chaotic maps, this paper provides a new proposed speech scrambling system based on using a hybrid use of different chaotic maps Logistic and Henon. Each chaotic map will generate key that will be used in speech scrambling. the comparison of the system with normal speech scrambler based on using only one chaotic map. Shows good level of security.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759946
Asia Mahdi Naser
This paper exhibits a brisk and straightforward strategy for changing over coloring pictures to perceptually exact grayscale variants. Strategies performing the transform of color image to grayscale plans to hold however much data about the source color picture as could be expected subsequent to critical picture highlights regularly vanish when color images are convert over to grayscale representation because of dimensionality reduction or varying requirements between the source and target color spaces. In this research we exhibited another complexity improving contrast to grayscale transformation calculation which comprise from procedure steps. Firstly, transform over RGB inputs to a perceptually uniform CIE L*a*b* color space and utilize Helmholtz-Kohlrausch Predictors to corrects L* based on the color chromatic component C* and hue angle H to get enhanced L**. Secondly, Dimensionality Reduction connected to Chrominance channels utilizing key segment investigation. Thirdly, upgrade the resulted grayscale image to the physical luminance channel based on mathematical with α=0.01 to enhance the contrast of resulted grayscale image. At long last, two dimensional Stationary Wavelet Transform (SWT) is connected in one level for melded the came about picture from past stride with Luminosity component L** to get the last grayscale picture. The grayscale image created relied on upon the calculation in the experiment confirm that the calculation has protected the notable components of the shading picture, for example, contrasts, sharpness, shadow, and image structure as contrasted and as compared with recently algorithms.
{"title":"Color to grayscale image conversion based dimensionality reduction with Stationary Wavelet transform","authors":"Asia Mahdi Naser","doi":"10.1109/AIC-MITCSA.2016.7759946","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759946","url":null,"abstract":"This paper exhibits a brisk and straightforward strategy for changing over coloring pictures to perceptually exact grayscale variants. Strategies performing the transform of color image to grayscale plans to hold however much data about the source color picture as could be expected subsequent to critical picture highlights regularly vanish when color images are convert over to grayscale representation because of dimensionality reduction or varying requirements between the source and target color spaces. In this research we exhibited another complexity improving contrast to grayscale transformation calculation which comprise from procedure steps. Firstly, transform over RGB inputs to a perceptually uniform CIE L*a*b* color space and utilize Helmholtz-Kohlrausch Predictors to corrects L* based on the color chromatic component C* and hue angle H to get enhanced L**. Secondly, Dimensionality Reduction connected to Chrominance channels utilizing key segment investigation. Thirdly, upgrade the resulted grayscale image to the physical luminance channel based on mathematical with α=0.01 to enhance the contrast of resulted grayscale image. At long last, two dimensional Stationary Wavelet Transform (SWT) is connected in one level for melded the came about picture from past stride with Luminosity component L** to get the last grayscale picture. The grayscale image created relied on upon the calculation in the experiment confirm that the calculation has protected the notable components of the shading picture, for example, contrasts, sharpness, shadow, and image structure as contrasted and as compared with recently algorithms.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759926
F. Kadhim, G. H. Abdul Majeed, Rasha S. Ali
Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.
{"title":"Proposal new s-box depending on DNA computing and mathematical operations","authors":"F. Kadhim, G. H. Abdul Majeed, Rasha S. Ali","doi":"10.1109/AIC-MITCSA.2016.7759926","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759926","url":null,"abstract":"Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759959
S. Sadkhan
It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice. The “Discipline” is a fundamental organizational concept, since it establishes the principle of “Knowledge Distribution” to a variety of “scientific fields”. Discipline usually tends to “ independency ” through the followings; drawing of its boundaries, put linguistic terminology, identify technologies , and identify theories. The main Disciplinary advantages related to: focus the limited “mental capacity” of individual on a specific knowledge domain, Removal of science from surface danger and uncertainty, and Help Scientist to deepen their researches and attention in molecules and atoms of their specializations. While Disciplinary Disadvantages are: Closing within a very narrow scientific particles of the Discipline, Forgetting that the “thing” they used is a part of “ a total “, Leave the search for a relationship of that part to other parts of the whole, Isolation from the “disciplines that overlap” and intersect with the specialization naturally and essentially, and Out of the distribution of work and nature of the higher qualification most experts seek to become king within his/her specialty.
{"title":"Multidisciplinary in science and technology","authors":"S. Sadkhan","doi":"10.1109/AIC-MITCSA.2016.7759959","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759959","url":null,"abstract":"It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice. The “Discipline” is a fundamental organizational concept, since it establishes the principle of “Knowledge Distribution” to a variety of “scientific fields”. Discipline usually tends to “ independency ” through the followings; drawing of its boundaries, put linguistic terminology, identify technologies , and identify theories. The main Disciplinary advantages related to: focus the limited “mental capacity” of individual on a specific knowledge domain, Removal of science from surface danger and uncertainty, and Help Scientist to deepen their researches and attention in molecules and atoms of their specializations. While Disciplinary Disadvantages are: Closing within a very narrow scientific particles of the Discipline, Forgetting that the “thing” they used is a part of “ a total “, Leave the search for a relationship of that part to other parts of the whole, Isolation from the “disciplines that overlap” and intersect with the specialization naturally and essentially, and Out of the distribution of work and nature of the higher qualification most experts seek to become king within his/her specialty.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759949
Osama M. Sangor, Haider K. Hoomod
In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work, a proposed secure online social network system designed and developed as a Web 2.0 technology application with several techniques in order to protect the sensitive data and personal information for the users and increase the security and privacy issue for OSN users.
{"title":"Secure online social network techniques","authors":"Osama M. Sangor, Haider K. Hoomod","doi":"10.1109/AIC-MITCSA.2016.7759949","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759949","url":null,"abstract":"In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work, a proposed secure online social network system designed and developed as a Web 2.0 technology application with several techniques in order to protect the sensitive data and personal information for the users and increase the security and privacy issue for OSN users.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759928
R. S. Mohammed, S. Sadkhan
Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker can take a periodic shape of chaos signal and found the system parameters. This paper proposed modifies two of chaos maps (Lorenz, Chen) and using it as pseudorandom number generator (PRNG). By using a test for noisy chaotic dynamics the results showed that the proposed maps are more random compared with original maps. The methods of speech scrambling are proposed in this paper. One of a method is using proposed random Lorenz map (RLM) as PRNG to scramble the values of Wavelet Transform (WT) speech signal. And the other is using proposed random Chen map (RCM) as PRNG to scramble the values of Discrete Cosine Transform (DCT) speech signal. A performance of the scheme is measured. The findings are good. A simulation of the proposed scheme has been implemented by using MATLAB (R2013a) programming language.
{"title":"Speech scrambler based on proposed random chaotic maps","authors":"R. S. Mohammed, S. Sadkhan","doi":"10.1109/AIC-MITCSA.2016.7759928","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759928","url":null,"abstract":"Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker can take a periodic shape of chaos signal and found the system parameters. This paper proposed modifies two of chaos maps (Lorenz, Chen) and using it as pseudorandom number generator (PRNG). By using a test for noisy chaotic dynamics the results showed that the proposed maps are more random compared with original maps. The methods of speech scrambling are proposed in this paper. One of a method is using proposed random Lorenz map (RLM) as PRNG to scramble the values of Wavelet Transform (WT) speech signal. And the other is using proposed random Chen map (RCM) as PRNG to scramble the values of Discrete Cosine Transform (DCT) speech signal. A performance of the scheme is measured. The findings are good. A simulation of the proposed scheme has been implemented by using MATLAB (R2013a) programming language.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759957
Jagdeep Singh, P. Kumari, Kulraj Kaur, A. Swami
The possibility of power transformer failure increases over the time as the age and rate of utilization increases. Since internal faults specially are the main cause of these failures, there are many ways and methods used to predict incipient fault and thus preventing the power transformer from failing by monitoring its condition. In oil immersed transformers, the DGA is used as one of the well-established tool to predict incipient faults occurring inside the body of power transformer. With already in existence of more than 5 known methods of DGA fault interpretation; there is the chance that all may give different conditions/results for the same sample. Using a combination of more than one of the methods and Support Vector Machine will result in increased accuracy of the interpretation and so reduces the uncertainty of the transformer condition monitoring.
{"title":"Condition assessment of power transformer using SVM based on DGA","authors":"Jagdeep Singh, P. Kumari, Kulraj Kaur, A. Swami","doi":"10.1109/AIC-MITCSA.2016.7759957","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759957","url":null,"abstract":"The possibility of power transformer failure increases over the time as the age and rate of utilization increases. Since internal faults specially are the main cause of these failures, there are many ways and methods used to predict incipient fault and thus preventing the power transformer from failing by monitoring its condition. In oil immersed transformers, the DGA is used as one of the well-established tool to predict incipient faults occurring inside the body of power transformer. With already in existence of more than 5 known methods of DGA fault interpretation; there is the chance that all may give different conditions/results for the same sample. Using a combination of more than one of the methods and Support Vector Machine will result in increased accuracy of the interpretation and so reduces the uncertainty of the transformer condition monitoring.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-01DOI: 10.1109/AIC-MITCSA.2016.7759944
D. Alshibani, Samar A. Qassir
A modern method for gray image enciphering depends on two techniques which are; DNA Exclusive-OR operation and 2D Chaotic Map is introduced. In preprocessing level, Arnold Transform is first applied on plain gray image for shuffling. Then, a DNA 2D matrix is resulted from encoding the shuffled gray image. Next, each of Henon Map and Ikeda Map are employed in keys generation to be used in the substitution and permutation process, respectively. The last process is decoding the resulted 2D matrix, and the enciphered image is obtained. The introduced method can acquire fine enciphering effect; has very low correlation (correlation close to zero), as well attains satisfactory entropy value close to 8, a wide secret key's space, strong sensitivity to secret key was the NPCR over 99% and UACI up to 33%, and has the abilities of resisting exhaustive attack and statistic attack as the investigational outcome and security analysis showed.
{"title":"Image enciphering based on DNA Exclusive-OR operation union with chaotic maps","authors":"D. Alshibani, Samar A. Qassir","doi":"10.1109/AIC-MITCSA.2016.7759944","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759944","url":null,"abstract":"A modern method for gray image enciphering depends on two techniques which are; DNA Exclusive-OR operation and 2D Chaotic Map is introduced. In preprocessing level, Arnold Transform is first applied on plain gray image for shuffling. Then, a DNA 2D matrix is resulted from encoding the shuffled gray image. Next, each of Henon Map and Ikeda Map are employed in keys generation to be used in the substitution and permutation process, respectively. The last process is decoding the resulted 2D matrix, and the enciphered image is obtained. The introduced method can acquire fine enciphering effect; has very low correlation (correlation close to zero), as well attains satisfactory entropy value close to 8, a wide secret key's space, strong sensitivity to secret key was the NPCR over 99% and UACI up to 33%, and has the abilities of resisting exhaustive attack and statistic attack as the investigational outcome and security analysis showed.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}