Preferred Language
Articles
/
BBd0nJABVTCNdQwCO4-x
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.

Scopus
View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Arabian Journal For Science And Engineering
Experimental Study of Cuttings Transport Efficiency of Low Solid Bentonite Drilling Fluids Modified by Cellulose Nanoparticles
...Show More Authors

Advancements in horizontal drilling technologies are utilized to develop unconventional resources, where reservoir temperatures and pressures are very high. However, the flocculation of bentonite in traditional fluids at high temperature and high pressure (HTHP) environments can lower cuttings transportation efficiency and even result in problems such as stuck pipe, decreased rate of penetration (ROP), accelerated bit wear, high torque, and drag on the drill string, and formation damage. The major purpose of the present research is to investigate the performance of low bentonite content water-based fluids for the hole cleaning operation in horizontal drilling processes. Low bentonite content water-based drilling fluids were formulated by re

... Show More
Crossref (4)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Photonics & Lasers In Medicine
The assessment of pathological changes in cerebral blood flow in hypertensive rats with stress-induced intracranial hemorrhage using Doppler OCT: Particularities of arterial and venous alterations/Die Beurteilung von pathologischen Veränderungen der Hirndurchblutung bei hypertensiven Ratten mit Stress-induzierten intrakraniellen Blutungen mittels Doppler-OCT: Besonderheiten von arteriellen und venösen Veränderungen
...Show More Authors
Abstract<p>Hemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst</p> ... Show More
View Publication
Scopus (13)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Spiking Neural Network in Precision Agriculture
...Show More Authors

In this paper, precision agriculture system is introduced based on Wireless Sensor Network (WSN). Soil moisture considered one of environment factors that effect on crop. The period of irrigation must be monitored. Neural network capable of learning the behavior of the agricultural soil in absence of mathematical model. This paper introduced modified type of neural network that is known as Spiking Neural Network (SNN). In this work, the precision agriculture system  is modeled, contains two SNNs which have been identified off-line based on logged data, one of these SNNs represents the monitor that located at sink where the period of irrigation is calculated and the other represents the soil. In addition, to reduce p

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref