The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this paper is the simulation development of A5/3 algorithms used by GSM networks security, one of the elements of the GSM networks security is A5/3 algorithm. the simulation facilities of the MATLAB, specifically by the used SIMULINK environment. According to knowledge, this is the first time to develop a SIMULINK approach for realization the proposed developments of A5/3, and testing...
Strength of encryption algorithm is based on statistical performance of the bits key stream. Generate high quality key stream is a difficult task, which decides the level of security provided by the encryption algorithm. This paper propose two main directions to deal with the biometric features of human voice: first it focuses on how to extract good features that lead to produce encryption keys of...
The elliptic ElGamal digital signature algorithm (EEDSA) has been created based on the ElGamal public key cryptosystem (EPKC) and the algorithm of the digital signature (DSA), defined on the elliptic curves, which was accepted in several (ANSI, IEEE, NIST and ISO) standards. The processes to generate keys, compute a signature and verify this signature in EEDSA require computing the elliptic curve...
Image compression is gaining good deal of attention and development nowadays. There are many uses and benefits incorporated with this application. Compressing an image will reduce its size to some amount that will enhance its storage or transmission over a network. In this paper, we proposed and compared two (Shift Coding) based techniques that we developed to gain the best compression ratios while...
Multiple Sequence Alignment (MSA) is a basic tool for bioinformatics research and analysis. It generally constitutes the foundation of many bioinformatics studies. MSAProbs is considered the most accurate MSA tool which is based-on pair Hidden Markov Models (HMM). MSAProbs takes long runtime with the relatively increasing of sequences molecular data. Since, distance computation is the most consuming...
Blood cell classification is the initial process for detecting diseases; the diseases can be carried if it is detected at early stage. For solving such problems. Quantitative processing of digital images based on fuzzy technique is applied for classification of red blood cells. There are various features consist of shape, size and colour based features that based on statistical analysis (i.e. Mean,...
This paper describes the different classifier methods with minimum means of clusters to achieve face recognition rate of humans from the feature extracted of training face image data for many sets of images as a data base. Principal Component Analysis (PCA) is a robust method used as feature extraction techniques for face recognition but the recognition decreases with the variation of person's actions...
Algebra is one of the important fields of mathematics. It concerns in the study and manipulates of mathematical symbols. It also concerns with study of abstractions such as groups, rings and fields. Ring theory is the most attractive category of algebra in the area of cryptography. Recently, many algebraic cryptosystem protocols based on non-commutative algebraic structures such as; authentication,...
The security aspect is considered as the most important challenge in communication and computer networks. Therefore the “security level evaluation” of cryptosystem, is very necessary research topic. This paper introduce the evaluation of RSA cryptosystem using (Adaptive Neural Fuzzy Inference System) ANFIS editor in MATLAB. The ANFIS technique include hybrid between ANN (Artificial Neural Network)...
The common in use for remote control tasks achieved via specific mobile (e.g. Android or iOS) and this control done only by radio remote control systems, infrared (IR) devices, etc.and limited in the edges of office/house, but not remote control automated for electric/ electronic devices from anywhere (outside of office/house). This paper proposed an Internet of Things (IoT) home automated system...
Internet of Thing (IoT) security has become a very important and will take a significant effect on industry of Internet of Things, due to is used in many fields. Data security issues become most important and are a difficult task for protecting the information transmitted over the IoT from intrusions. Currently, the traditional cryptography has several types of algorithms that give High Security,...
In remote sensing applications, a solid angle has a wide appearing, therefore it's important to know what it means. The solid angle subtended by a surface S is characterized as the surface range of a unit circle secured by the surface's projection onto the circle. Solid angle is effectively, an observer that can be used as a measure of how big an object looks to be. The paper is aimed to find the...
The Intelligent Internet of Things (I2oT) has become a significant technology in the recent research area. The application of internet of thing expands to the connectivity for anything, anytime and anyplace. It is expected that there will be 50 billion devices connected to the internet of things by 2020. This huge number of device that were connected together to establish internet of things. However,...
Many techniques are implemented to perform fingerprint recognition approach, and each technique based on specific criteria. The aim of this work is to find an efficient fingerprint recognition technique. This paper tries to offer a simple high performance approach to perform fingerprint recognition. This approach based on two main stages; the first one is the real data collection of human fingerprint...
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
In this paper, a new model of focal and non-focal electroencephalography classification is carried out using a deep neural network (DNN). The Convolution Architecture For Feature Extraction (Caffe) framework with three different models (LeNet, AlexNet, and GoogLeNet) are applied, where the DNN is trained with different training epoch values (TEs). The performance of discriminating the focal and non-focal...
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be compromised by attackers. To secure this channel from the eavesdropping attack, man in the middle attack, and so on. A new hybrid encryption image mechanism that utilize triangular scrambling, DNA encoding and chaotic map is implemented. The scheme takes a master key with a length...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.