Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThis study discusses risk management strategies caused by pandemic-related (Covid-19) suspensions in thirty-six engineering projects of different types and sizes selected from countries in the middle east and especially Iraq. The primary data collection method was a survey and questionnaire completed by selected project crew and laborers. Data were processed using Microsoft Excel to construct models to help decision-makers find solutions to the scheduling problems that may be expected to occur during a pandemic. A theoretical and practical concept for project risk management that addresses a range of global and local issues that affect schedule and cost is presented and results indicate that the most significant delays are due to a
... Show MoreThe rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex
... Show MoreMetal (III) and (II) coordination compounds of o- phenylenediamine, oxalic acid dihydrate and 8-hydroxyquinoline were synthesized for mixed ligand complexes and characterized using FT-IR, UV-Vis and mass spectra, atomic absorption, elemental analysis, electric conductance and magnetic susceptibility measurements. In addition, thermal behavior (TGA) of the metal complexes (1-6) showed good agreement with the formula suggested from the analytical data. The stoichiometric reaction between the metal (III) and (II) ions with three various ligands in molar ratio at aqueous ethyl alchol for (1:1:1:1) (M: O-PDA: OA: 8-HQ) [where M = Cr+3, Mn+2, Co+2, Ni+2. Cu+2 and Zn+2; O-PDA = O-Phenylenediamine; OA = Oxalic acid and 8-HQ = 8-Hydroxyquinoline]. R
... Show MoreEnterococcus faecalis is a natural inhabitant of the human gastrointestinal tract but can become dominant and cause infections when the intestinal homeostasis is disrupted. Enterococcal bacteria are considered one of the main reasons for the failure of endodontic treatment. This study aim to isolation and identification of E.faecalis depended on phenotype and molecular method, the phenotypic patterns using traditional biochemical methods, and then diagnosed it based on the genotypes and using specialized primers for 16srRNA and D-Ala: D-Ala ligase genes using polymerase chain reaction, In order to achieve successful treatment, it is necessary to study the bacterial behavior within the root canal system together with their resistance and def
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThis study discusses risk management strategies caused by pandemic-related (Covid-19) suspensions in thirty-six engineering projects of different types and sizes selected from countries in the middle east and especially Iraq. The primary data collection method was a survey and questionnaire completed by selected project crew and laborers. Data were processed using Microsoft Excel to construct models to help decision-makers find solutions to the scheduling problems that may be expected to occur during a pandemic. A theoretical and practical concept for project risk management that addresses a range of global and local issues that affect schedule and cost is presented and results indicate that the most significant delays are due to a
... Show MoreThis research delves into the realm of asphalt technology, exploring the potential of nano-additives to enhance traditional asphalt binder properties. Focusing on Nano-Titanium Dioxide (NT), Nano-Aluminum Oxide (NA), and Nano-Silica Oxide (NS), this study investigates the effects of incorporating these nanomaterials at varying dosages, ranging from 0% to 8%, on the asphalt binder’s performance. This study employs a series of experimental tests, including consistency, storage stability, rotational viscosity, mass loss due to aging, and rheological properties, to assess the impact of nano-additives on asphalt binder characteristics. The findings indicate a substantial improvement in the consistency of the asphalt binder with the add
... Show More