This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient of Iraqi financial reporting requirements of segmental information affect<
... Show MoreThe research was conducted in a plastic greenhouse at the College of Agricultural Engineering Sciences, University of Baghdad - Jadiriyah Campus, during the 2021-2022 season, to study the effect of phosphorus, silicon, and citric acid on pepper plants using a factorial experiment design with three replicates. The first factor had three levels of phosphorus (0, 160, and 320 kg P2O5 per hectare), the second factor had three levels of potassium silicate (0, 75, and 100 kg per hectare), and the third factor had four levels of citric acid (0, 2, 4, and 6 kg per hectare). The statistical analysis showed that treatment P2S2C1 resulted in an increase
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
In this research, a modified artificial hand with direct control has been designed using electrical artificial muscle wires that receive direct sensory impulses through human hand instead of using the mechanical action to open and close this artificial hand. Each finger is designed as a chain and its movements achieved through the conventional arrangement control of the electrical muscles wires. The results indicate that it is possible to design an artificial hand using electrical muscle wire for control it with high accuracy.