In the present time, dam management is considered one of the important challenges for e-government in Iraq, becuase it needs information technology infrastructure, data integrity and protection of user privacy against Internet threats that render such vital infrastructure ineffective. This struggle between the proposed dam management system (DMS) and a multi-tier secure model specifically for the Fallujah dam (and generally for all dams) which is addressed in this paper as a case study. To do this, a relational database design will discuss the development of a multi-tier secure model for integration of the dam management framework with its functions. This paper will discusse encryption and decryption of the dam data using the advanced encryption standard (AES) algorithm with derived keys via PBKDF2 and RNG sequences generator and Slave key for salting protection. The experimental results and analysis on the speed of encryption/decryption process, entropy value, plain text sensitivity, key sensitivity, keyspaceanalysis and histogram analysis will prove the the proposed scheme can impede the known attacks like brute force attacks, statistical and differential.Thus, the encryption scheme can be implemented on the proposed DMS and any other information system, as the implementation which will be presented in the results.
Advances in wavelet transform have produces algorithms capable of surpassing the existing digital signal processing. This paper presents a new wavelet transform computation method that verifies the potential benefits of the kronecker product and gains much improvement in terms of low computational complexity.A fast algorithm for computing 2-D wavelet transform based on a modified orthogonal matrix is developed using kronecker product. The algorithm has several promising features which make it suitable for 2-D signal processing applications.
Power-Efficient Gathering in Sensor Information Systems (PEGASIS) protocol is energy efficient protocols designed to prolong the lifetime of the network by reduction of energy consumption. In this paper a modification is proposed to the PEGASIS algorithm where sensor nodes are clustered in groups ,clustering is done by Ant colony optimization algorithm, and each group is treated as PEGASIS. In addition, the proposed algorithm used rechargeable sensor nodes. Two parameters are searched to select chain leader: Euclidean distance of sensor node to the base station and residual energy of sensor node. Each cluster head data is transmitted directly to the base station. Simulation results showed the proposed algorithms improved in comparison with original PEGASIS.
Most systems of speaker recognition work on speech feature primarily classified of being a low level which considerably relies on speaker physical characteristics and, to the lower extent, the acquired speaking habits. In this paper present a system to recognition and identification in Arabic speaker. It includes two phases (training phase and testing phase) each phase includes the using of audio features (Mean, Standard Division, Zero Crossing, Amplitude). after get the feature, the recognition step is using (J48, KNN, LVQ),) where the Nearest Neighbor (KNN) applied o get the similarity of the data training and data testing , LVQ neural network used for Speech Recognition and Arabic language Identification. This sentence contains words especially kidnappings and kidnappers are ten sentences and pronounce these sentences by 10 people, five men and five women of different ages and each of the ten pronunciation of all sentences, so a total of 100 samples and the samples were recorded on audio and wave. The results of the sentences pronounced by women are higher than the results of the same sentences pronounced by men. They achieved better recognition rate 85, 93, 96.4%
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.