This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
We define a new concept, called " generalized right -derivation", in near-ring and obtain new essential results in this field. Moreover we improve this paper with examples that show that the assumptions used are necessary.
A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw
... Show MoreIraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreCuneiform symbols recognition represents a complicated task in pattern recognition and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Among the undesirable effects of soil compaction is a measurable reduction in plant growth and crop yield. The prevailing belief is that compacted tillage pans are caused by repetitive farming practices, heavy tractors, tillage tools, and field traffic. This experiment was conducted to determine and map the hardpan layers across an agricultural field through advanced technologies of precision agriculture. These valuable techniques such as data logger, yield map, and data analysis of performance indicators were linked with accurate global positioning systems (GPS) datasets. These important technologies provided the farmers and helped them to identify and manage areas of the fields with higher compacted layers. Three ground speeds 4.3
... Show MoreBackground: Chronic cigarette smoking is one of the major risk factors for coronary artery disease. However, it has additional cardiac adverse effects independent of coronary atherosclerosis. Patient and Methods: After informed consent and perm- ission from the review board of the hospital, 80 healthy subjects who were classified as smokers or non-smokers were included in the study. They were examined by standard echocardiography protocol which was followed by two-dimensional speckle tracking to assess the functions of the right ventricle. Results: The tricuspid annular plane systolic excursion (TAPSE) was significantly reduced in smokers as compared to non-smokers (P < 0.05). The tricuspid flow peak late diastolic velocity (A wave) was sig
... Show MoreIn this work , we study different chaotic properties of the product space on a one-step shift of a finite type, as well as other spaces. We prove that the product is Lyapunove –unstable if and only if at least one or is Lyapunove –unstable. Also, we show that and locally everywhere onto (l.e.o) if and only if is locally everywhere onto (l.e.o) .