The bandwidth requirements of the telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user.The passive optical
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe development of Japanese society passed through long historical stages and as a result of the bitter experience of Japan in the Second World War and its exhaustion, it was able to build a modern modern state after 1945. Japan is a country of culture, civilization, science and technology, a country that appreciates the value of solidarity work. And the role of active civil society. This is what makes us in Iraq stand and draw their experience in the advancement and development, especially that they also passed bitter political stages, Iraq today passes through the most historical periods of forestry through its historical heritage in terms of the existence of complex social problems, the US occupation of Iraq in 2003 highlighte
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIn this research, we have added nano anatase TiO2 as a partial replacement of Portland cement by a weight percentage of (0.25 to 1%) for the development of properties for protection against bacteria. The control mix was made by using "the cement to sand" proportion about (1: 2.75) with the "water to cement" proportion of (0.5) to study the structure, porosity, water absorption, density, mechanical properties, as well as anti-bacterial behavior. Inspections have been done such as scanning electron microscopy (SEM), and atomic force microscope (AFM) for mortar. Experimental results showed that after the addition of Nano powders in cement mortar, the structural properties improved significantly with the development of hydration o
... Show MoreThe developing countries, like our country Iraq suffer from deep comprehensive structural crisis, manifestations and a clear imbalance between the demand and the supply sides. The overall imbalance in the external balance. As a consequence, this caused the accumulation of foreign debts or failure in the implementation of economic development programs. The countries which are forced to resort to the International Monitoring Funds, and the World Bank for assistance and to express an opinion on policies that include restrictions controls that belong to the monetary, and fiscal side group, imposed on the economies crisis, as a condition for returning to normal which called reform programs. The organize of the events of radical changes in the
... Show MoreThe Mishrif Formation is one of the most important geological formations in Iraq consisting of limestone, marl, and shale layers since it is one of the main oil producing reservoirs in the country, which contain a significant portion of Iraq's oil reserves. The formation has been extensively explored and developed by the Iraqi government and international oil companies, with many oil fields being developed within it. The accurate evaluation of the Mishrif formation is key to the successful exploitation of this field. However, its geological complexity poses significant challenges for oil production, requiring advanced techniques to accurately evaluate its petrophysical properties.
This study used advanced well-logging analysi
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreThe steady state performance of the counter rotating floating ring Journal bearing is analyzed with isothermal finite bearing theory. The effect of different parameters affecting the performance of the bearing (namely speed ratio, clearance ratio and radii ratio), have been investigated. The load carrying capacity of the bearing increasing with decreasing the radii ratio (R2/R1) of the ring and clearance ratio (c1/c2), in the other hand, the coefficient of friction increases with increasing the clearance and radii ratios, while decreases with incre4asing the bearing to journal speed ratio (γ). It is shown during this work that different operating conditions are greatly enhanced the performance
... Show More