Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
Planning for a city with human identity considers the needs of human being that exist in the traditional cities where it was so easy creating place there, on the other hand, modern cities refuse these values and reduce the human characters of urban fabric elements , and the searching for the concept of " Urban Coherence " considers the knowledge about urban theory, especially Morphological attitudes finding three sides of making the coherence of dense urban fabric which are " Functional Complementarily , Formal Complementarily ,
Contextual complementarily “and the differentiation of these sides within the variety of spatial structural patterns between the organic type of traditional city and the gridiron type of modern city. To
... Show MoreAt the beginning of the nineties increased responsibility of the auditor to the community as the demand for auditing the environmental performance for the economic units in addition to audit the financial performance. With the aim of preserving the environment and reducing the damagse as aresult of the negative effects of the activities of these units.
The researh deal with two sides the first one identifies the theoretical framework of the concept of environmental audits, requirements, methods, types of procedures, and duties of the auditor in conducting environmental audits. It also deals with the concept of the enviro
... Show MoreWhereas conventional methods of teaching history do not meet the sometimes purpose has suggested some educators strategies modern help to improve the level of students in the education process through activating prior knowledge and employed in positions of current learning, and focus attention on the points and the outstanding elements of the content and practice techniques Calendar criticof ideas and meanings and mental and linguistic activities used to verify the extent of reaching understanding. &n
... Show MoreAthletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreMany people take protein supplements in an effort to gain muscle. However, there is some controversy as to whether this is really effective. There is evidence suggesting that consuming high level s of protein may in fact have negative side effects for health. The current study included 29 young Iraqi building muscles in two different groups (taken and not protein supplements) (age range=17-31 years), the cases were selected from family, friends, college students, and Gyms), from November 2014 to March 2015. A careful history was obtained from each volunteer including age, duration of sports, type of supplements, and family history of diseases. Some biochemical parameters like (glucose, urea, uric acid, creatinine, bilirubin, serum protei
... Show MoreToday, more than ever before, the business organizations’ initiatives should seek to design themselves and delivery them to the environment because of its change, and the increasing of uncertainties and the growing opportunities. What is required by the business organizations is that to adopt good approaches to stimulate the modern thinking and non traditional thinking and exploit the valued concepts and overcome the old thinking. Substantially, the scenario planning is the art of thinking about what is unexpected.
Therefore the research’s problem is reflected to answer the following questions:
- What
The main goal of the current research is to know -Environmental problems included in the content of the two science books (chemistry units) for intermediate stage
A list of environmental problems had been prepared and consisting of (8) main areas which are (air and atmosphere pollution, water pollution, soil pollution, energy, disturbance of biodiversity and environmental balance, waste management, food and medicinal pollution, investment of mineral wealth). Of which (60) sub-problems, at that time the researcher analyzed the two science books (two chemistry units) for the intermediate stage of the academic year (2020-2021) in light of the list that was prepared, and the validity and consisten
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More