This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
Background: Scientific education aims to be inclusive and to improve students learning achievements, through appropriate teaching and learning. Problem Based Learning (PBL) system, a student centered method, started in the second half of the previous century and is expanding progressively, organizes learning around problems and students learn about a subject through the experience of solving these problems.Objectives:To assess the opinions of undergraduate medical students regarding learning outcomes of PBL in small group teaching and to explore their views about the role of tutors and methods of evaluation. Type of the study: A cross-sectional study.Methods: This study was conducted in Kerbala Medical Colleges among second year students
... Show MoreBackground: Crohn's disease (CD) is an immunological disorder associated with chronic inflammatory process of several unspecific regions of gastrointestinal tract but frequently detected in the terminal Ilium and proximal colon or both. This disease frequently presented with various oral manifestations as a consequence of inflammatory process of the disease, nutritional deficiency or medications side effects. Several therapeutic approaches have been developed for CD management that are targeting the inflammatory process and directed at controlling the host immune response. Immunosuppressants such as Azathioprine and anti-TNF α agents as well as the combination of them have been widely used as an effective therapeutic modality with a bett
... Show MoreThe relationship between F2- layer critical frequencies (foF2), total sunspot number (Ri), northern hemisphere sunspot number (Rn) and southern hemisphere sunspot number (Rs) at station located in mid- latitudes on latitude near to latitude of Iraq (Rome station, lat.: 42o N and lon.: 13o E) and for 2003(the descending phase of solar cycle 23) were studied.
This research work aims to know the correlation range between them, through correlation coefficients which correlate between them, and hence, the dependence on that index for predicting F2- layer critical frequencies. When the correlation coefficients between foF2, Ri, Rn and Rs were compared for different seasons of 2003, It is found that, correlation coefficient between foF2 and
The aim of this paper is to investigate the effects of Nd:YAG laser shock processing (LSP) on micro-hardness and surface roughness of 86400Cu-Zn alloy. X-ray fluorescence technique was used to analyze the chemical composition of this alloy. LSP treatment was performed with a Q-switched Nd: YAG laser with a wavelength of 1064 nm. The results show that laser shock processing can significantly increase. The micro-hardness and surface roughness of the LSP-treated sample. Vickers diamond indenter was used to measure the micro-hardness of all samples with different laser pulse energy and the different number of laser pulses. It is found that the metal hardness can be significantly increased to more than 80% by increasing the laser energy and t
... Show MoreThe aim of current study is estimate the ability of low cost adsorbents, which consist of extracted silica from rice husk ash in treatment of Industrial waste water that contains heavy metals (Cd, Co and Pb) with other pollutants by fixed filters technique with determine the best method for that, and study the effect of a number of variables and parameters. This study involved one waste water samples were collected from. State battery manufacturing company (SBMC) (before treatment unit) at 5th and 22th, of the January 2015. Adsorption tests showed that all tested adsorbent materials had a significant heavy metal removal efficiency. pH values showed a significant impact on adsorption process, but best removal efficiency occurred at pH 4.5
... Show MoreSteganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur
... Show MoreData hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show MoreCities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi
... Show More