Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for synchronization

Article
New Fractional Order Chaotic System: Analysis, Synchronization, and it’s Application

Zain-Aldeen S. A. Rahman, Basil Hani Jasim, Yasir I. A. Al-Yasir

Pages: 116-124

PDF Full Text
Abstract

In this paper, a new nonlinear dynamic system, new three-dimensional fractional order complex chaotic system, is presented. This new system can display hidden chaotic attractors or self-excited chaotic attractors. The Dynamic behaviors of this system have been considered analytically and numerically. Different means including the equilibria, chaotic attractor phase portraits, the Lyapunov exponent, and the bifurcation diagrams are investigated to show the chaos behavior in this new system. Also, a synchronization technique between two identical new systems has been developed in master- slave configuration. The two identical systems are synchronized quickly. Furthermore, the master-slave synchronization is applied in secure communication scheme based on chaotic masking technique. In the application, it is noted that the message is encrypted and transmitted with high security in the transmitter side, in the other hand the original message has been discovered with high accuracy in the receiver side. The corresponding numerical simulation results proved the efficacy and practicability of the developed synchronization technique and its application

Article
Synchronization and tracking control of a novel 3 dimensional chaotic system

Basil H. Jasim, Mofeed Turky Rashid, Khulood Moosa Omran

Pages: 99-104

PDF Full Text
Abstract

In this article, a novel three dimensional chaotic systems is presented. An extensive analysis including Lyapunov exponents, dissipation, symmetry, rest points with their properties is introduced. An adaptive tracking control system for the proposed chaos system has been designed. Also, synchronization system for two identical systems has been designed. The simulation results showed the effectiveness of the designed tracking and synchronization control systems.

Article
Compensation of transmission channel effects in chaos synchronization

A. Buscarino, L. Fortuna, M. Frasca, G. Sciuto, M. T. Rashid

Pages: 83-87

PDF Full Text
Abstract

The synchronization of chaos is a well-known topic which attracted the attention of the scientific community in the last two decades. However, the robustness of the synchronous state has been not widely studied, especially considering real cases in which the effects introduced by the physical channel through which chaotic circuits interact, may deeply influence the quality of synchronization and even the onset of it. In this paper, the synchronization of two chaotic circuit coupled through a non– ideal channel is investigated. In particular, the effects of channels introducing a frequency–independent or frequency–dependent time–delay are investigated. Furthermore, two different design strategies to obtain a linear compensation block able to compen- sate the considered channel effects are presented and the recovery of the synchronous state is discussed.

Article
Study of Chaotic-based Audio Encryption Algorithms: A Review

Alaa Shumran, Abdul-Basset A. Al-Hussein

Pages: 85-103

PDF Full Text
Abstract

Nowadays, multimedia communication has become very widespread and this requires it to be protected from attackers and transmitted securely for reliability. Encryption and decryption techniques are useful in providing effective security for speech signals to ensure that these signals are transmitted with secure data and prevent third parties or the public from reading private messages. Due to the rapid improvement in digital communications over the recent period up to the present, the security of voice data transmitted over various networks has been classified as a favored field of study in earlier years. The contributions to audio encryption are discussed in this review. This Comprehensive review mainly focuses on presenting several kinds of methods for audio encryption and decryption the analysis of these methods with their advantages and disadvantages have been investigated thoroughly. It will be classified into encryption based on traditional methods and encryption based on advanced chaotic systems. They are divided into two types, continuous-time system, and discrete-time system, and also classified based on the synchronization method and the implementation method. In the fields of information and communications security, system designers face many challenges in both cost, performance, and architecture design, Field Programmable gate arrays (FPGAs) provide an excellent balance between computational power and processing flexibility. In addition, encryption methods will be classified based on Chaos-based Pseudo Random Bit Generator, Fractional-order systems, and hybrid chaotic generator systems, which is an advantageous point for this review compared with previous ones. Audio algorithms are presented, discussed, and compared, highlighting important advantages and disadvantages. Audio signals have a large volume and a strong correlation between data samples. Therefore, if traditional cryptography systems are used to encrypt such huge data, they gain significant overhead. Standard symmetric encryption systems also have a small key-space, which makes them vulnerable to attacks. On the other hand, encryption by asymmetric algorithms is not ideal due to low processing speed and complexity. Therefore, great importance has been given to using chaotic theory to encode audio files. Therefore, when proposing an appropriate encryption method to ensure a high degree of security, the key space, which is the critical part of every encryption system, and the key sensitivity must be taken into account. The key sensitivity is related to the initial values and control variables of the chaotic system chosen as the audio encryption algorithm. In addition, the proposed algorithm should eliminate the problems of periodic windows, such as limited chaotic range and non-uniform distribution, and the quality of the recovered audio signal remains good, which confirms the convenience, reliability, and high security.

Article
Speed Control of Steel Rolling Mill using Neural Network

Abduladhem A. Ali, Alaa M. Abdulrahman

Pages: 1-6

PDF Full Text
Abstract

In this paper a fully neural network-based structure have been proposed to control speeds of rolling stands of a steel rolling mill. The structure has property of controlling the motors speed such that the loop height between each successive stands tracks the required height reference. Synchronization between these stands is also maintained so that the metal flow rate from first stand to the last stand is kept constant. This structure is robust against the disturbance effects such as, torque loading, plant parameter change... etc. The results reveal performance of the structure as a comparison with the conventional control method for a practical worksheet data.

Article
Design and FPGA Implementation of a Hyper-Chaotic System for Real-time Secure Image Transmission

Abdul-Basset A. Al-Hussein, Fadhil Rahma Tahir, Ghaida A. Al-Suhail

Pages: 55-68

PDF Full Text
Abstract

Recently, chaos theory has been widely used in multimedia and digital communications due to its unique properties that can enhance security, data compression, and signal processing. It plays a significant role in securing digital images and protecting sensitive visual information from unauthorized access, tampering, and interception. In this regard, chaotic signals are used in image encryption to empower the security; that’s because chaotic systems are characterized by their sensitivity to initial conditions, and their unpredictable and seemingly random behavior. In particular, hyper-chaotic systems involve multiple chaotic systems interacting with each other. These systems can introduce more randomness and complexity, leading to stronger encryption techniques. In this paper, Hyper-chaotic Lorenz system is considered to design robust image encryption/ decryption system based on master-slave synchronization. Firstly, the rich dynamic characteristics of this system is studied using analytical and numerical nonlinear analysis tools. Next, the image secure system has been implemented through Field-Programmable Gate Arrays (FPGAs) Zedboard Zynq xc7z020-1clg484 to verify the image encryption/decryption directly on programmable hardware Kit. Numerical simulations, hardware implementation, and cryptanalysis tools are conducted to validate the effectiveness and robustness of the proposed system.

1 - 6 of 6 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.