This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
This research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreThe investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat
... Show MoreThe basic skills (defensive & offensive) in basketball it is a base for completion and decide the level of the team and the rank, in same time considers the axel of the researchers when putting tests and forming new groups so close from real situation games to create real vision and estimate for skill state and a method to recorrect & presenting positive resolutions, the problem of research were indicate to variables may happen in training operation it demand tests matches with these variables and forming new standards, and another way the researchers find a few patterns for measuring basic skills (defensive & offensive) also application these tests on samples it differs from the originals one that the tests designed for it. The sample repr
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More
Abstract
Islam has been concerned with preserving and maintaining rights, so the provisions in which it is preserved are legislated. Among that is the testimony that made it a way to prove the truth and obliges its bearer to fulfill right in order to preserve the right and establish justice and prevent injustices by defying conflict, and tyranny .
And while acknowledging that divine absolute wisdom that is the cause and origin of legal rulings is sufficient, it is obligatory to abide by its provisions and imposes obedience, surrender, contentment and work in accordance with its controls.
However, the realization of the defects behind the legislation in a comprehensive way that realizes the dev
... Show MoreGeophysical data interpretation is crucial in characterizing the subsurface structure. The Bouguer gravity map analysis of the W-NW region of Iraq serves as the basis for the current geophysical research. The Bouguer gravity data were processed using the Power Spectrum Analysis method. Four depth slices have been acquired after the PSA process, which are: 390 m, 1300 m, 3040 m, and 12600 m depth. The gravity anomaly depth maps show that shallow-depth anomalies are mainly related to the sedimentary cover layers and structures, while the gravity anomaly of the deeper depth slice of 12600 m is more presented to the basement rocks and mantle uplift. The 2D modeling technique was used for
Urine samples had been gathered from females living in Baghdad city. The sample consisted of 30 females who suffered from U.T.I (Urinary tract infections) and 20 healthy females. The type of urine U.T.I was specified by the emergency lab in Al-Kindy hospital, and alpha tracks were determined by the nuclear track detector CR-39. The concentrations of alpha in 30 urine samples taken from females who had U.T.I ranged from 0.327ppm-1.583ppm, with an average of 0.94965 ppm. The maximum value 1.583 ppm is belonging to females with an aged 57 years old. The results of healthy female concentration ranged from 0.022 ppm-0.459ppm with an average of (0.30855ppm). The findings revealed that alpha emitter concentrations differed from woman to woman,
... Show MoreImage Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show More