首页 > 最新文献

2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)最新文献

英文 中文
Performance comparison for lane detection and tracking with two different techniques 车道检测与跟踪两种不同技术的性能比较
A. Humaidi, M. Fadhel
This paper presents the performance comparison for lane detection and tracking using two techniques; Hough transform and color thresholding. Hough transform includes the following steps: gray scale conversion, edge detection, Hough space accumulation and un-Hough step to draw line. Color thresholding algorithm comprises color thresholding, morphology filtering and drawing tracking label. The results showed that Hough transform technique outperforms color technique in terms of reliability, efficiency and speed of code implementation. Both techniques are coded using MATLAB R2010b.
本文介绍了两种技术在车道检测和跟踪方面的性能比较;霍夫变换和颜色阈值。Hough变换包括以下几个步骤:灰度转换、边缘检测、Hough空间积累和非Hough步画线。颜色阈值分割算法包括颜色阈值分割、形态滤波和绘制跟踪标签。结果表明,霍夫变换技术在编码实现的可靠性、效率和速度上都优于颜色变换技术。这两种技术都使用MATLAB R2010b进行编码。
{"title":"Performance comparison for lane detection and tracking with two different techniques","authors":"A. Humaidi, M. Fadhel","doi":"10.1109/AIC-MITCSA.2016.7759943","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759943","url":null,"abstract":"This paper presents the performance comparison for lane detection and tracking using two techniques; Hough transform and color thresholding. Hough transform includes the following steps: gray scale conversion, edge detection, Hough space accumulation and un-Hough step to draw line. Color thresholding algorithm comprises color thresholding, morphology filtering and drawing tracking label. The results showed that Hough transform technique outperforms color technique in terms of reliability, efficiency and speed of code implementation. Both techniques are coded using MATLAB R2010b.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"102 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of micro heat sink for power transistor by using CFD 基于CFD的功率晶体管微散热器设计
H. Alhattab, Mahir A. Albaghdadi, Raed S. Hashim, Ali H. Ali
Different geometrical pattern of micro pin fins heat sinks for TO-220 power transistor has been modeled by using academic edition of multi-physics computational fluid dynamic (CFD) package COMSOL v 4.4 to enhance the heat transfer of power transistor. To Comparing COMSOL model results with experimental results, thermocouples sensors (type: FLUKE 87V, USA) and infrared camera (FLIR E50) were used. Experimental results showed that the model of this work has a high reliability. The assembled micro pin fins heat sinks modeled to the power transistor provides an efficient and economical improvement in thermal transferring, around 11.6oC has been reduced by modeling a heat sink with square, rectangular and hydrofoil micro pin fins compared to smooth heat sink.
利用多物理场计算流体动力学(CFD)软件包学术版COMSOL v 4.4对to -220功率晶体管微引脚翅片散热器的不同几何形状进行了建模,以增强功率晶体管的传热能力。为了比较COMSOL模型结果与实验结果,采用热电偶传感器(型号:FLUKE 87V,美国)和红外摄像机(FLIR E50)。实验结果表明,该模型具有较高的可靠性。模拟功率晶体管的装配微针翅散热器提供了高效和经济的热传递改进,与光滑散热器相比,通过建模方形,矩形和水翼型微针翅散热器降低了约11.6℃。
{"title":"Design of micro heat sink for power transistor by using CFD","authors":"H. Alhattab, Mahir A. Albaghdadi, Raed S. Hashim, Ali H. Ali","doi":"10.1109/AIC-MITCSA.2016.7759948","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759948","url":null,"abstract":"Different geometrical pattern of micro pin fins heat sinks for TO-220 power transistor has been modeled by using academic edition of multi-physics computational fluid dynamic (CFD) package COMSOL v 4.4 to enhance the heat transfer of power transistor. To Comparing COMSOL model results with experimental results, thermocouples sensors (type: FLUKE 87V, USA) and infrared camera (FLIR E50) were used. Experimental results showed that the model of this work has a high reliability. The assembled micro pin fins heat sinks modeled to the power transistor provides an efficient and economical improvement in thermal transferring, around 11.6oC has been reduced by modeling a heat sink with square, rectangular and hydrofoil micro pin fins compared to smooth heat sink.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A proposed speech scrambling based on hybrid chaotic key generators 一种基于混合混沌密钥发生器的语音置乱算法
S. Sadkhan, Hussein Ali
Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted information, Based on chaotic maps, this paper provides a new proposed speech scrambling system based on using a hybrid use of different chaotic maps Logistic and Henon. Each chaotic map will generate key that will be used in speech scrambling. the comparison of the system with normal speech scrambler based on using only one chaotic map. Shows good level of security.
由于无线通信技术的飞速发展和用户之间信息传递的公共通道的存在,使得信息安全问题日益突出,特别是对这些信息的窃听和攻击。在混沌映射的基础上,提出了一种基于Logistic和Henon混合使用不同混沌映射的语音置乱系统。每个混沌映射将生成用于语音置乱的密钥。将该系统与仅使用一个混沌映射的普通语音扰频器进行了比较。显示出良好的安全水平。
{"title":"A proposed speech scrambling based on hybrid chaotic key generators","authors":"S. Sadkhan, Hussein Ali","doi":"10.1109/AIC-MITCSA.2016.7759941","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759941","url":null,"abstract":"Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted information, Based on chaotic maps, this paper provides a new proposed speech scrambling system based on using a hybrid use of different chaotic maps Logistic and Henon. Each chaotic map will generate key that will be used in speech scrambling. the comparison of the system with normal speech scrambler based on using only one chaotic map. Shows good level of security.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Color to grayscale image conversion based dimensionality reduction with Stationary Wavelet transform 基于平稳小波降维的彩色到灰度图像转换
Asia Mahdi Naser
This paper exhibits a brisk and straightforward strategy for changing over coloring pictures to perceptually exact grayscale variants. Strategies performing the transform of color image to grayscale plans to hold however much data about the source color picture as could be expected subsequent to critical picture highlights regularly vanish when color images are convert over to grayscale representation because of dimensionality reduction or varying requirements between the source and target color spaces. In this research we exhibited another complexity improving contrast to grayscale transformation calculation which comprise from procedure steps. Firstly, transform over RGB inputs to a perceptually uniform CIE L*a*b* color space and utilize Helmholtz-Kohlrausch Predictors to corrects L* based on the color chromatic component C* and hue angle H to get enhanced L**. Secondly, Dimensionality Reduction connected to Chrominance channels utilizing key segment investigation. Thirdly, upgrade the resulted grayscale image to the physical luminance channel based on mathematical with α=0.01 to enhance the contrast of resulted grayscale image. At long last, two dimensional Stationary Wavelet Transform (SWT) is connected in one level for melded the came about picture from past stride with Luminosity component L** to get the last grayscale picture. The grayscale image created relied on upon the calculation in the experiment confirm that the calculation has protected the notable components of the shading picture, for example, contrasts, sharpness, shadow, and image structure as contrasted and as compared with recently algorithms.
本文展示了一种快速而直接的策略,用于将过色图片更改为感知上精确的灰度变体。当彩色图像转换为灰度表示时,由于维数降低或源和目标颜色空间之间的需求变化,执行彩色图像到灰度计划的策略(以保留关键图像高光之后的尽可能多的源彩色图像数据)通常会消失。在这项研究中,我们展示了另一种复杂性,提高对比度的灰度变换计算,包括从程序步骤。首先,将RGB输入转换为感知均匀的CIE L*a*b*色彩空间,并利用Helmholtz-Kohlrausch预测器根据色彩分量C*和色相角H对L*进行校正,得到增强的L**。其次,利用关键段调查连接到色度通道的降维。第三,将得到的灰度图像基于数学方法升级到物理亮度通道,使α=0.01增强灰度图像的对比度。最后,将二维平稳小波变换(SWT)在一个层次上进行连接,将过去步幅生成的图像与亮度分量L**进行融合,得到最后的灰度图像。在实验中,通过计算得到的灰度图像证实,该计算保护了阴影图像中对比度、锐度、阴影和图像结构等重要组成部分,并与最近的算法进行了对比。
{"title":"Color to grayscale image conversion based dimensionality reduction with Stationary Wavelet transform","authors":"Asia Mahdi Naser","doi":"10.1109/AIC-MITCSA.2016.7759946","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759946","url":null,"abstract":"This paper exhibits a brisk and straightforward strategy for changing over coloring pictures to perceptually exact grayscale variants. Strategies performing the transform of color image to grayscale plans to hold however much data about the source color picture as could be expected subsequent to critical picture highlights regularly vanish when color images are convert over to grayscale representation because of dimensionality reduction or varying requirements between the source and target color spaces. In this research we exhibited another complexity improving contrast to grayscale transformation calculation which comprise from procedure steps. Firstly, transform over RGB inputs to a perceptually uniform CIE L*a*b* color space and utilize Helmholtz-Kohlrausch Predictors to corrects L* based on the color chromatic component C* and hue angle H to get enhanced L**. Secondly, Dimensionality Reduction connected to Chrominance channels utilizing key segment investigation. Thirdly, upgrade the resulted grayscale image to the physical luminance channel based on mathematical with α=0.01 to enhance the contrast of resulted grayscale image. At long last, two dimensional Stationary Wavelet Transform (SWT) is connected in one level for melded the came about picture from past stride with Luminosity component L** to get the last grayscale picture. The grayscale image created relied on upon the calculation in the experiment confirm that the calculation has protected the notable components of the shading picture, for example, contrasts, sharpness, shadow, and image structure as contrasted and as compared with recently algorithms.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposal new s-box depending on DNA computing and mathematical operations 提出基于DNA计算和数学运算的新s盒
F. Kadhim, G. H. Abdul Majeed, Rasha S. Ali
Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.
如今,信息已成为一种重要的资源,信息安全也成为一种重要的资源。许多科学家试图在密码学和隐写术领域使用受DNA生物技术启发的新方法。使用DNA密码学的想法已经被指定为可能的技术,因为传统的密码系统现在容易受到某些攻击,因此它为不可破解的算法带来了新的希望。s -box(替换盒)是现代对称密码系统(分组密码和流密码)的基石。本文提出了一种基于DNA密码子编码、异或运算和一些数学运算的s盒生成方案。试验结果表明,该方法有效地通过了平衡性、完备性、雪崩准则和严格雪崩准则等S-Box试验准则。结果表明,该方法提供了安全的S-box,仅改变1位密钥就发现255个差异,约改变了99%的S-box。该方法以密钥和服务器名为例生成S-box的新值,使用两个密钥来增强创建的S-box的安全性。此外,可以使用一个键来生成S-Box值,因为使用所建议的方法生成了另一个键,它等于0。s-box逆也根据生成s-box时使用的相同字符串生成。以毫秒为单位的生成时间。该方法不包括遗传算法等多个阶段。因此所提出的方法比遗传算法速度快,实际上遗传算法要经过几个阶段才能找到最优解。
{"title":"Proposal new s-box depending on DNA computing and mathematical operations","authors":"F. Kadhim, G. H. Abdul Majeed, Rasha S. Ali","doi":"10.1109/AIC-MITCSA.2016.7759926","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759926","url":null,"abstract":"Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Multidisciplinary in science and technology 多学科的科学技术
S. Sadkhan
It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice. The “Discipline” is a fundamental organizational concept, since it establishes the principle of “Knowledge Distribution” to a variety of “scientific fields”. Discipline usually tends to “ independency ” through the followings; drawing of its boundaries, put linguistic terminology, identify technologies , and identify theories. The main Disciplinary advantages related to: focus the limited “mental capacity” of individual on a specific knowledge domain, Removal of science from surface danger and uncertainty, and Help Scientist to deepen their researches and attention in molecules and atoms of their specializations. While Disciplinary Disadvantages are: Closing within a very narrow scientific particles of the Discipline, Forgetting that the “thing” they used is a part of “ a total “, Leave the search for a relationship of that part to other parts of the whole, Isolation from the “disciplines that overlap” and intersect with the specialization naturally and essentially, and Out of the distribution of work and nature of the higher qualification most experts seek to become king within his/her specialty.
仅仅在专业领域内收集与该领域相关的各种问题是不够的。“科学研究领域”的开放性仍然是必要的和至关重要的。学科描述了与学术研究领域或专业实践领域密切相关的知识、技能、项目、社区、问题、挑战、研究、方法和研究领域。“学科”是一个基本的组织概念,它确立了对各种“科学领域”的“知识分配”原则。纪律通常倾向于“独立”通过以下几个方面;划定其界限,放语言术语,识别技术,识别理论。学科优势主要体现在:将个人有限的“心智能力”集中在特定的知识领域,使科学远离表面的危险和不确定性,帮助科学家加深对其专业分子和原子的研究和关注。而学科的缺点是:封闭在学科的一个非常狭窄的科学粒子中,忘记了他们使用的“东西”是“整体”的一部分,把寻找这一部分的关系留给整体的其他部分,与“重叠的学科”隔离开来,与专业化自然和本质上相交,出于工作的分配和更高资格的性质,大多数专家寻求成为他/她专业的国王。
{"title":"Multidisciplinary in science and technology","authors":"S. Sadkhan","doi":"10.1109/AIC-MITCSA.2016.7759959","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759959","url":null,"abstract":"It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice. The “Discipline” is a fundamental organizational concept, since it establishes the principle of “Knowledge Distribution” to a variety of “scientific fields”. Discipline usually tends to “ independency ” through the followings; drawing of its boundaries, put linguistic terminology, identify technologies , and identify theories. The main Disciplinary advantages related to: focus the limited “mental capacity” of individual on a specific knowledge domain, Removal of science from surface danger and uncertainty, and Help Scientist to deepen their researches and attention in molecules and atoms of their specializations. While Disciplinary Disadvantages are: Closing within a very narrow scientific particles of the Discipline, Forgetting that the “thing” they used is a part of “ a total “, Leave the search for a relationship of that part to other parts of the whole, Isolation from the “disciplines that overlap” and intersect with the specialization naturally and essentially, and Out of the distribution of work and nature of the higher qualification most experts seek to become king within his/her specialty.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure online social network techniques 安全的在线社交网络技术
Osama M. Sangor, Haider K. Hoomod
In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work, a proposed secure online social network system designed and developed as a Web 2.0 technology application with several techniques in order to protect the sensitive data and personal information for the users and increase the security and privacy issue for OSN users.
在过去的几十年里,在线社交网络(OSN)已经成为人们之间最方便和首选的交流方式,无论年龄、文化、教育背景或职位。在线社交网络的快速发展也带来了一定的隐私风险,同时也引起了人们对使用osn泄露部分个人数据的安全性的担忧。为了保护用户的敏感数据和个人信息,增加OSN用户的安全和隐私问题,本文采用Web 2.0技术,结合多种技术,设计并开发了一个安全的在线社交网络系统。
{"title":"Secure online social network techniques","authors":"Osama M. Sangor, Haider K. Hoomod","doi":"10.1109/AIC-MITCSA.2016.7759949","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759949","url":null,"abstract":"In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work, a proposed secure online social network system designed and developed as a Web 2.0 technology application with several techniques in order to protect the sensitive data and personal information for the users and increase the security and privacy issue for OSN users.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech scrambler based on proposed random chaotic maps 基于随机混沌映射的语音扰频器
R. S. Mohammed, S. Sadkhan
Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker can take a periodic shape of chaos signal and found the system parameters. This paper proposed modifies two of chaos maps (Lorenz, Chen) and using it as pseudorandom number generator (PRNG). By using a test for noisy chaotic dynamics the results showed that the proposed maps are more random compared with original maps. The methods of speech scrambling are proposed in this paper. One of a method is using proposed random Lorenz map (RLM) as PRNG to scramble the values of Wavelet Transform (WT) speech signal. And the other is using proposed random Chen map (RCM) as PRNG to scramble the values of Discrete Cosine Transform (DCT) speech signal. A performance of the scheme is measured. The findings are good. A simulation of the proposed scheme has been implemented by using MATLAB (R2013a) programming language.
密码技术必须随着无线通信技术的发展而发展。最近的研究之一是基于混沌的密码学。由于混沌信号中存在数据冗余,并且并非所有的混沌映射都是随机的,因此攻击者可以取混沌信号的周期性形状并找到系统参数。本文提出对两个混沌映射(Lorenz, Chen)进行修正,并将其用作伪随机数发生器(PRNG)。通过对噪声混沌动力学的测试,结果表明所提出的映射比原始映射具有更大的随机性。本文提出了语音置乱的几种方法。其中一种方法是利用提出的随机洛伦兹映射(RLM)作为PRNG对小波变换语音信号的值进行置乱。二是利用提出的随机陈映射(RCM)作为PRNG对离散余弦变换(DCT)语音信号的值进行置乱。测试了该方案的性能。研究结果是好的。采用MATLAB (R2013a)编程语言对该方案进行了仿真。
{"title":"Speech scrambler based on proposed random chaotic maps","authors":"R. S. Mohammed, S. Sadkhan","doi":"10.1109/AIC-MITCSA.2016.7759928","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759928","url":null,"abstract":"Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker can take a periodic shape of chaos signal and found the system parameters. This paper proposed modifies two of chaos maps (Lorenz, Chen) and using it as pseudorandom number generator (PRNG). By using a test for noisy chaotic dynamics the results showed that the proposed maps are more random compared with original maps. The methods of speech scrambling are proposed in this paper. One of a method is using proposed random Lorenz map (RLM) as PRNG to scramble the values of Wavelet Transform (WT) speech signal. And the other is using proposed random Chen map (RCM) as PRNG to scramble the values of Discrete Cosine Transform (DCT) speech signal. A performance of the scheme is measured. The findings are good. A simulation of the proposed scheme has been implemented by using MATLAB (R2013a) programming language.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Condition assessment of power transformer using SVM based on DGA 基于DGA的支持向量机电力变压器状态评估
Jagdeep Singh, P. Kumari, Kulraj Kaur, A. Swami
The possibility of power transformer failure increases over the time as the age and rate of utilization increases. Since internal faults specially are the main cause of these failures, there are many ways and methods used to predict incipient fault and thus preventing the power transformer from failing by monitoring its condition. In oil immersed transformers, the DGA is used as one of the well-established tool to predict incipient faults occurring inside the body of power transformer. With already in existence of more than 5 known methods of DGA fault interpretation; there is the chance that all may give different conditions/results for the same sample. Using a combination of more than one of the methods and Support Vector Machine will result in increased accuracy of the interpretation and so reduces the uncertainty of the transformer condition monitoring.
随着电力变压器的使用年限和利用率的增加,电力变压器发生故障的可能性也随之增加。由于内部故障是这些故障的主要原因,因此有许多方法和方法可以通过监测电力变压器的状态来预测早期故障,从而防止电力变压器发生故障。在油浸式变压器中,DGA是一种成熟的预测变压器内部早期故障的工具。已有5种以上已知的DGA断层解释方法;对于同一样品,所有人可能会给出不同的条件/结果。将多种方法与支持向量机结合使用,可以提高解释的准确性,从而减少变压器状态监测的不确定性。
{"title":"Condition assessment of power transformer using SVM based on DGA","authors":"Jagdeep Singh, P. Kumari, Kulraj Kaur, A. Swami","doi":"10.1109/AIC-MITCSA.2016.7759957","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759957","url":null,"abstract":"The possibility of power transformer failure increases over the time as the age and rate of utilization increases. Since internal faults specially are the main cause of these failures, there are many ways and methods used to predict incipient fault and thus preventing the power transformer from failing by monitoring its condition. In oil immersed transformers, the DGA is used as one of the well-established tool to predict incipient faults occurring inside the body of power transformer. With already in existence of more than 5 known methods of DGA fault interpretation; there is the chance that all may give different conditions/results for the same sample. Using a combination of more than one of the methods and Support Vector Machine will result in increased accuracy of the interpretation and so reduces the uncertainty of the transformer condition monitoring.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Image enciphering based on DNA Exclusive-OR operation union with chaotic maps 基于DNA异或运算结合混沌映射的图像加密
D. Alshibani, Samar A. Qassir
A modern method for gray image enciphering depends on two techniques which are; DNA Exclusive-OR operation and 2D Chaotic Map is introduced. In preprocessing level, Arnold Transform is first applied on plain gray image for shuffling. Then, a DNA 2D matrix is resulted from encoding the shuffled gray image. Next, each of Henon Map and Ikeda Map are employed in keys generation to be used in the substitution and permutation process, respectively. The last process is decoding the resulted 2D matrix, and the enciphered image is obtained. The introduced method can acquire fine enciphering effect; has very low correlation (correlation close to zero), as well attains satisfactory entropy value close to 8, a wide secret key's space, strong sensitivity to secret key was the NPCR over 99% and UACI up to 33%, and has the abilities of resisting exhaustive attack and statistic attack as the investigational outcome and security analysis showed.
一种现代的灰度图像加密方法依赖于两种技术:介绍了DNA异或运算和二维混沌映射。在预处理阶段,首先对普通灰度图像进行Arnold变换进行洗牌。然后,对洗牌后的灰度图像进行编码,得到DNA二维矩阵。接下来,分别使用Henon Map和Ikeda Map生成键,分别用于替换和置换过程。最后对得到的二维矩阵进行解码,得到加密后的图像。该方法可以获得良好的加密效果;具有非常低的相关性(相关性接近于零),并且获得了令人满意的接近8的熵值,密钥空间宽,对密钥的敏感性强,NPCR超过99%,UACI高达33%,并且具有抗穷尽攻击和统计攻击的能力,调查结果和安全性分析表明。
{"title":"Image enciphering based on DNA Exclusive-OR operation union with chaotic maps","authors":"D. Alshibani, Samar A. Qassir","doi":"10.1109/AIC-MITCSA.2016.7759944","DOIUrl":"https://doi.org/10.1109/AIC-MITCSA.2016.7759944","url":null,"abstract":"A modern method for gray image enciphering depends on two techniques which are; DNA Exclusive-OR operation and 2D Chaotic Map is introduced. In preprocessing level, Arnold Transform is first applied on plain gray image for shuffling. Then, a DNA 2D matrix is resulted from encoding the shuffled gray image. Next, each of Henon Map and Ikeda Map are employed in keys generation to be used in the substitution and permutation process, respectively. The last process is decoding the resulted 2D matrix, and the enciphered image is obtained. The introduced method can acquire fine enciphering effect; has very low correlation (correlation close to zero), as well attains satisfactory entropy value close to 8, a wide secret key's space, strong sensitivity to secret key was the NPCR over 99% and UACI up to 33%, and has the abilities of resisting exhaustive attack and statistic attack as the investigational outcome and security analysis showed.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1