Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
2 The benefit of the leave of our time is the leakage and inclusion in the series of narrators of modern.
3 The leave is therefore permissible to narrate the hadeeth or other sciences from a sheik or sheiks, and not
the talk.
4 It is not necessary that the grantee of the leave has studied the student who is the holder of the leave.
5 - in which a great meaning is the sense of the recipient seeking blessing through the link
With attribution to our master Muhammad peace be upon him.
The problem of research is to identify the uses of Iraqi women for Facebook and the motives of these uses and the innovations that have been achieved from them, in view of the increasing role-played by social networking sites in the lives of individuals in general and women in particular.The research seeks to identify the following: Identify the extent to which Iraqi women use Facebook and the usage motives and innovations achieved by the interviewees When they using Facebook. This study belongs to the descriptive studies that are interested in monitoring the characteristics of a particular phenomenon to identify its characteristics and characteristics.This study adopted the survey methodology to test the hypotheses of the study and how
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThe purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform
... Show MoreAbstract:
One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.
Water supply projects (WSP) requires high plan information, specialized capabilities, capable human resources, and high administrative capacity. However, in the developing countries, particularly in Iraq, these projects experience a lack of a large number of these necessities, which shows the need to identify the critical success factors (CSFs). Accordingly, the objectives of this research are to investigate the CSFs for WSP and their significance among the construction (public and private) and education sectors. To achieve this, first we have carried out a comprehensive literature review of the CSFs for WSP. Second, we administrated a questionnaire survey to 260 construction experts
Perceptions of deity have practical effects in a person’s life, especially in his attitudes toward natural things since nature was created, in which man has treated it as something sacred. The Greek philosophers before Plato and Aristotle did not find in them the idea of divinity clear. Rather, they all searched for the first substance or the first cause of existence, and then gave it all the attributes of God from eternity and eternity, and considered it a first reason without which the universe would not have existed. knowledg
Heuristic Program proposal for the treatment of talented emotional and Cognitive problems .
1-The Curtent research aims : to identify the needs of gifted students and their problems and Ways to diagnose .
2-reprepare aproposal heuristic program for the treatment of emotional and Cognitive talented problems .
Research . Methodology : analytical and descriptive .
Define the terms
Virt uoso is the per for mance of the privileged Mstmrave performances appear in any area of his Values .
Chapter ll : Includes recipes gifted child and Methods diagnosis gifted by filtrontion and standavds of personal and mental and behavioral Doramwaliman and parental Features and Leader in the detection of the gif
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.