2012, Volume:6 Issue:2


Copyright Authentication By Using Karhunen-Loeve Transform

Ghada Thanon Yuonis , Khalil I. Al_saif --- Sundus

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper presents authentication by using Karhunen-Loeve transformation for copyright authentication in digital image, where four various size of watermarking image used to embed them inside the least significant bits of the cover image. The application proved that using Karhunen-Loeve transformation is very useful to improve the authentication, where the watermarking image will appear clearly only when using all eigenvalues to retrieve the watermarking from the resulted image. The number of eigenvalues were studied to give their effect on the robustness of the authentication, the direct proportional relationship appeared between the number of used eigenvalues and the authentication.

Key Management Scheme for Mobile Wireless Sensor Networks

Sufyan T. Faraj --- Foad Salem Mubarek

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and deliver that information to the base station. WSNs are usually deployed in unattended environment and like other networks need to be secured. In order to secure WSNs, firstly cryptography keys must be distributed in a secure and robust way. Key management problem is rapidly studied in the static WSNs, but it has not been studied thoroughly in mobile (or dynamic) WSNs. When mobility is introduced within WSNs, many challenges and new characteristics appear in the security model. Security requirements for mobile WSNs include authentication, confidentiality, and integrity. The key management scheme represents the corner stone for achieving security services. In this paper, we propose a key management scheme for mobile WSNs which based on track-sector clustering in the roaming area. The proposed system is relying on symmetric cryptography for achieving its goals. The paper represents a work-in-progress report on our advance in the development of this proposal.

AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS

Shaymaa W. Abdulatteef

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark were installed. Mikrotik Router OS give the same results of real environment. This work aims to drop unwanted packets according to rules defined to Mikrotik Router OS including source address, destination address, source & destination port and specified action written in command line window

TORDES-THE NEW SYMMETRIC KEY ALGORITHM

Pawitar Dulari , --- Ajay Bhushan

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies the functionality of TORDES for encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure

Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures

Azmi shawkat abdulbaki

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Sign language Plays important role in activating the relation between people and computers , through the activation of the concept of hand movements and provide easier way for people with disabilities (deaf) to express what they want and replace it with their hands.This paper give the overview of proposed backpropagation neural network algorithm to construct a method to identify some of computer tools through hand sign (gesture).

New Construction of a Chaotic Generator on the Lorenz Attractor

Abdallah M’Hamed , Naima Hadj-Said --- Adda Ali-P

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although its behaviour is unforeseeable. The chaotic generator hereby suggested is implemented under the 7.0 version of MATLAB software. It makes use exclusively, of the fundamental properties of chaotic systems; that are sensitivity to initial conditions and equations of strange attractor. All is done in order to set up systems with protected transmissions. As a matter of fact and in the long term, the unforeseeable behaviour of such systems is very much related to the extreme sensitivity of initials conditions. Another fundamental property is that the chaotic system is characterized by a strange attractor, within the space of state.

Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time

Ali Jbaeer Dawood

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Round Robin (RR) is a kind of process algorithms, where the time quantum is fixed along the processes execution. In the other hand it depending on the First Come First Serve (FCFS) algorithm. Also RR performs in timesharing system by given each process static Time Quantum (TQ). In this paper, The TQ studied to improve the efficiency of RR and performs the degrades with respect to Context Switching (CS), Average Wait Time (AWT) and Average Turned Around Time (ATAT) that an overhead on the system. Thus, the new approach was proposed to calculate the TQ, known as Ascending Quantum and Minumim-Maxumum Round Robin (AQMMRR). The processes were ascending with shortest remaining burst time and calculate the TQ from multiply the summation of minimum and maximum BT by (80) percentage. The experimental result shows that AQMMRR performs better than RR and comparing with other two related works

The Mechanism of Monitoring and Tracking of Healthcare Systems

Khattab M. Ali Alheeti , Muzhir Shaban Al-Ani ---

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people at home, car, office, and any other location. e-healthcare deals with patients that they are located far from doctor jurisdiction. Healthcare monitoring including measurements of temperature, blood pressure / pulse monitors and ECG, etc. This works deals with the development of monitoring system via adding intelligent system to distinguish the emergency cases. This work try to keep patient data privacy, reduce attack or penetration of data, reduce processing time and at the same time increasing the efficiency of the overall system. The privacy of patient data is critical so this must maintain the confidentiality of information from intrusion

The Role of Metadata for Effective Data Warehouse

Alaa Abdulqahar Jihad --- Murtadha M. Hamad

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Metadata efficient method for managing Data Warehouse (DW). It is also an effective tool in reducing the time or speed to answer queries. In addition, it achieved capabilities of the integration and standardization, thus lead to faster, clear and accurate decision-making in the right time. This paper provides the definition of metadata concept, and using metadata in Data Cleaning; which it identify the sources, types of fields, and choose the appropriate algorithm. In addition, useful in Decision Support System (DSS); which it improve efficiency of analysis and reduces response time of query

The Use of Two Transform Methods in Fingerprints Recognition

Baraa Tareq Hammad , Salah Sleibi Al-Rawi --- Is

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Finger prints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. Fingerprint matching is the process used to determine whether two sets of fingerprint ridge detail come from the same finger. There exist multiple algorithms that do fingerprint matching in many different ways. Some methods involve matching minutiae points between the two images, In this paper used median filter to enhance the images, and then use DCT (Discrete Cosine Transform) and FDCvT Via Wrapping to compute the feature extraction from the images. The Template Matching can be applied by finding the more similar values between the original image and the template.The proposed system includes two stages: first stage is implemented by taking individual natural fingerprint images with several positions and calculation of the features vector (Mean and standard deviation) by using FDCvT via Wrapping and DCT. The second stage is implemented by taking several samples of new fingerprint images for testing the work. The results show that the fingerprints Recognition rate by the (FDCvT via Wrapping and DCT) achieves better recognition rate (84%).

Data Hiding In Contourlet Coefficients Based On Their Energy

Khalil I. Alsaif --- Nagham S. AL-lella

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research the contourlet transformation coefficients were studied to decide which of them are suitable to embed data on it a lot of parameters of the contourlet coefficients can be discussed one of them is the coefficient energy.The research covered most of the suggested events which could be met during the embedding state, one of them the size of the cover in addition to the size of the information were studied. Applying the suggested idea on different type of image with different size (cover image and the message image) shows that the coefficients with low level of energy are suitable to embedded the information, and the retrieved cover and message are so closed to the original one.

Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures

Abdulhamed M. Jasim --- Jassim M. Abdul-Jabbar

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

In this paper, the 1st order Gaussian derivative wavelet function utilized in the design of some corresponding filter banks. Since the 1st order Gaussian derivative function has a similar shape to QRS complex part of the ECG, it can be used in QRS feature extraction. Using this characteristic of such wavelet function, the designed FIR wavelet filter banks can be realized in highly-efficient lattice structures which are easy to implement in two standard deviation values ( ?=1 and ?=2 ). The resulting lattice structures reduce the number of filter banks coefficients and this reduces, in turn the number of multiplications and improves the filter banks efficiencies as it reduces the number of computations performed. The resulting quantized multiplier values can also lead to multiplierless realizations using sum-of-power-of-two (SOPOT) method. FPGA implementations of such structures are achieved with less-complexity.

Performance Testing Technique for Applied Programs

Falath M. Mohammad--- Mortadha M. Hamad

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

In this paper, software was preparedto use for measuring the programs performance because of the importance of measuring the programs performance. The performance of any program basically depends on spent time and storing area needed to implement any program. This work implemented manually is based on trusted rules to guess the executive time. In this research we used the same rules of complexity through a program to give the same manual results automatically and speedily. In addition to the time and storing area, the prepared software uses other standards to analyze the performance of a program like reliability, documentation and others as shown later. All these standards help in taking the appropriate decision about performance.This research was accomplished the performance test of program samples written with Pascal language as easy to understand with simple structures which is provide clear and easy start to test the performance of programs in other languages like c + +

Face Detection by Skin Color based on Elman Neural Network

Ghada Thanoon , Amera Istiqlal--- Nadia maan

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

In this paper, a propose system was present for face detection by the color of skin which is the main feature in the skin, the system depends on the color properties that extracted from the skin using Fast Fourier Transforme (FFT), then, the Neural Network (Elman) used to test the filtered skin peaces for make dicession if the original colored image has a face or not.The proposed system was tested upon group of colored images and the results give a good average in detection exceeds 86%

Trusted Cloud Computing

Kashif Kifayat , Sufyan T. Faraj--- Waleed K. Aw

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G) collaborations, etc. There are many concerns about cloud computing especially in terms of security, privacy and trust. These main issues have prevented businesses from fully accepting cloud platforms. Cloud computing demands three primary security requirements: confidentiality, integrity, and availability. In this paper we discuss some these issues by reviewing a recently proposed model [1] that interestingly handles secure messaging among services deployed within the same cloud or on different clouds. Then, we report on our ongoing work which is based on enhancing and developing this model. This is mainly achieved by adding a new service layer which is responsible for offering a high level of trust between collaborative parties. The added layer facilitates the integration of this model with the Public-Key Infrastructure (PKI). The main objective of the developed model is to increase the trust of the whole system by preventing any unauthorized party from joining the connectivity service. Indeed, our system can prevent any involved organization from launching masquerade attacks

Optimal Code book Generating LBG Algorithm

Ibrahim Ahmed saleh--- Khalil Ibrahim Al_saif

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

In this research, have been applied(LBG) algorithm to create optimal code book tat used in vector quantization, which use in widely for image and signal processing .It use in image compressing, voice compression and data encryption when it sent them, In the application used software (Matlab) in the coding and encoding stage we obtain to the number of vectors with less distortion equal(64), and when compare this algorithm with others method we see that it's the best in the training for create the optimal codebooks to return image

A New VQ Technique for Steganography in JPG

Ansam Osama Abdulmajeed --- Ahmed Sami Nori

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

present research was aimed to implement a new Steganographic algorithm for colored images in Vector Quantization (VQ) compressed domain, since the compressed image considers a secure cover for data to be embedded to avoid attention of unauthorized persons. Also, it saves the cost and time of transmission and storage. The new algorithm aimed to increase the embedding capacity with maintaining the image quality as well as reducing the time of the extraction process. The algorithm was implemented using Matlab 2009a. It embedded two bits in each index depending on mod 4, and secret key shared between sender and receiver. The algorithm used grayscale and RGB images for (JPG) of different resolutions after compression in order to be used as a cover of secret data which were either as text or image. In the research, the new algorithm provided an acceptable image quality despite of the high embedding capacity that occupy the cover image completely, Also, the codebook was not needed for data extraction which led to reducing the extraction time significantly

The Mechanism of Deliberate Jamming On the Broadcast Satellite Service.

Riyad Mitieb Mahmood

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

A direct broadcast satellite is making maximum efforts to transmission the TV signal from the source to the receiving in the small home earth stations, especially the important events of a widespread public demand. The power and the nature of the television signal affected by losses resulting from the length of the path and the natural noise , thus the signal's loss part of its power at the reception, but the most influential is the possibility of deliberate jamming, thus the signal of reception has loosed completely. So we are in this research analysis of the technical side to transmit the signal from the Earth station to the satellite, which is the line upward and then receive that signal and processed by machines effector inside the satellite and re-sent as a line downward to the receiving stations. The statement of the impact of deliberate jamming on that process by attacking the line upward by the largest power after the completion of the integrated analysis the original signal using sophisticated of high technology equipment. Based on that, we can see the statement of the used method to deliberate jamming on satellite's channels and methods of prevention ,then it used the simulation program (MATLAB) according to the laws relating to communication satellites, taking into account the latitude and longitude and geographic location of ground stations, satellites, sending and receiving. The results were important and productive because they determine the ability and nature of the signal for a private reception with deferent effects.

Standard printed musical note recognition based on neural network

Saja jasem Mohammed

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Artificial neural network is widely used for many computer applications and assure it success in all of these fields, like recognition applications. In this paper the a supervised NN is used to recognize printed musical notes. First music staff image is read, this staff is segmented in to no. of single music note, then feature extraction is performed on results using combination of mathematic and statistic operations. BP now will trained on all extracted feature to recognize the standard printed music notes. This algorithm is applied on many examples and achieve good results and low error rate

Management of Identity and Access in the Cloud

Kashif Kifayat, Sufyan T. Faraj --- Sameeh Abdulg

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps

An Enhanced Authentication Based on Biometric and Neural Network

Nadia maan , Najla Badie--- Melad Jader

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

Because of the significant in the field of information technology, increasing means of communication and networks , proliferation of electronic crimes and personality theft, the security of information and verification of the identity of the user became the biggest concerns of institutions and individuals. Hence, several types to verify the reliability of people appeared, some of them relied on traditional means like passwords and smart cards, other modern methods adopted the biometric features for which vital statistics, which depends on the characteristics of natural or unique behavior in people. The artificial neural networks have been used by a large number of researchers to achieve the goals of information security and so as it is ability of learning and modeling of complex relationships between inputs and Outputs.This research suggest a way to improve the user authentication scheme in high security applications in networks. Artificial neural network is used (Back propagation network) to provide privacy to the user and vital feature (fingerprint iris of the eye) being one of the best biometric features to verify the identity of the user as it is the consistency and accuracy in addition to ease of use

Achieve reliable and confidential message using Pretty Good Privacy (PGP) algorithm

Raya Jassim Essa

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

The paper aims at verifying the reliability of the exchanged data and information. The study conducted using the Pretty Good Privacy (PGP) algorithm application within a network of computers. It proposed to provide a method to achieve reliability, using digital signatures and a suitable algorithm for pressing the data before sending it By information security and cryptography, the study assumes the possibility of achieving reliable and confidential information handled electronically. Algorithms using different pressing and digital signatures as well as giving a method for encryption . Enhance reliability algorithm being superior privacy and verification of confidentiality applied. The research has come to several conclusions, most notably: reduction of statistical information limiting the code analyst, reduce the size of the text to speed up the encryption process, access to the highest level of security; and synthesis applied to programs with ready-made structural language adopted in this area

A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements

Suhail M. Ali

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

is obvious that Artificial Neural Networks (ANN) is a successful method for system control and simulating nonlinear loads. This paper suggests an ANN model that can simulate the effects of nonlinear Temperature –Resistance characteristic of Silicon Carbide (Sic) load which used as heating elements in the recent electrical furnaces. Moreover, the paper proves that the proposed ANN control model is efficient to aid a conventional control so as keep the power density on the work piece at nearly constant level that is demanded during the heating curing process of the electrical furnace.

Implementation of a Proposal Encryption Algorithm for Voice over Internet Protocol (VoIP)

Manar Y. Kashmola --- Ahmed Yassin Kamil

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, so as, to reduce its size and make it understandable to persons not authorized to listen to. A system was designed to encrypt the voice over Internet Protocol (VoIP) and use compression technique for the purpose of reducing the size of data and send it over the network, (A_law PCM) algorithm was used the to compress audio data. Then algorithms of Triple Data Encryption Standard (TDES) and Advanced.Encryption Standard (AES) were applied. A new encryption algorithm was proposed based in its work on the block cipher encryption system called the Direct and Reverse algorithm, which based on three basic steps, firstly expand the initial key, secondly direct the encryption of each round in one direction, and finally substitute (Bytes) as used in the Compensation Box in AES algorithm by making it moving. In general compression ratio was calculated and it was (50%) and the results of the correlation coefficient for the proposed algorithm was compared with the results of (AES, TDES) algorithms.

The New Intelligent System for the Protection of E-learning from Penetration

Waleed khaled , Khattab M. Ali Alheeti-- Salah M

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

This paper focuses on the design new intelligent system to prevent the e-learning from attack. electronic learning (e-learning) systems are becoming widely used tools for distance education/training and enhancement of regular in-person programs, of the importance of e-learning and the role of effective senior he had shown during the past few years needed to protect it from penetration and unauthorized access. We designed a defense system increases the defensive power of the educational site to protect it from any attacks and this increases the reliability of education and pay it forward. Using Artificial neural networks, which is one of the areas of artificial intelligence, design a system that has much to distinguish between this is a right to access to information or not depending on the properties is challenging and can be of these properties are similar for each person characteristics that are different from each other. Thus we have obtained an education system that drives the scientific enterprise secretary and the result of this artificial system with excellent is a penetration rate of non-existent.

Design of Embedded Image Processing System Using FPGAs

Sara A. Mohamed --- Mazen R. Khalil

Journal of University of Anbar for Pure Science , Volume:6 Issue:2

The work aims to design an image processing system to be configured on Spartan-3E FPGA. Embedded design techniques were adopted to construct a soft core processor system. Intel strata flash parallel NOR PROM is added to the system to meet the requirement of storing huge number of image samples. Suitable software driver with C language are used for purpose of erasing the flash PROM and write operations. High- pass and unsharp digital filers were used for the purpose of image processing. Matlab program is used for verifying the results.