To move forward on the path of goodness and peace, we must realize that, in the midst of the great diversity of cultures and forms of human life in the world, that we form one human nation, which God Almighty created to worship Him on His earth and under His heavens and to enjoy His bounties and natural resources that God Almighty has bestowed upon that nation. On one land, and it is governed by one common destiny. Every country has been endowed with a natural resource by God Almighty that distinguishes it from the other country to live in prosperity if these wealth are distributed equally among the members of the same society and societal justice is achieved. We must join together to work for the establishment of a sustainable global community, based on respect for the beautiful nature that God Almighty created for mankind to live in peace, security and prosperity, and to achieve justice, equality, universal human rights, economic justice, and a culture of peace.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreThe present study aimed to investigate effect of Pregabalin (PGB) on ovary tissue and number of follicles in female albino rats. Three groups of healthy adult female albino rats, fifteen rats in each group were used in current study. The rats of groups, G2 and G3 were administered orally with two doses 150 mg and 300mg/kg b.wt/day of pregabalin, respectively. The doses were given daily for 1 month, 2 months, and 3 months. Animals of group G1 (Control) were given saline alone. After the experimental periods, the rats were sacrificed and the isolated ovaries were histologically examined. The results of histological analysis of the ovaries in treated rats (G2, and G3) showed a significant (P≤0.05) decrease in the number of preantral, antral,
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe fouling depositions of crude oil stream were studied theoretically in a shell and tube heat exchanger to investigate the effect of depositions on the heat transfer process. The employed heat exchanger was with steam flowing in the inner tubes and crude oil in the shell at different velocities and bulk temperatures. It is assumed that fouling occurs only on the heated stream side (crude oil). The analysis was carried out for turbulent flow heat transfer conditions with wide range of Reynolds number, bulk temperature and time. Many previously proposed models for fouling resistance were employed to estimate a new model for fouling rate. It is found that the fouling rate and consequently the heat transfer coefficient were affected by Rey
... Show MoreCadastral maps are the main documents of ownership and plots of land, as it contribute to preserving the property rights of individuals and institutions. It indicates the size and shape of each parcel and reveals geographic relationships that affect property value. The Iraqi cadastral maps are in old coordinate system AL-nahrwan 1934 and lambert conformal conic projection. Therefore these maps are old and unfit for use. The main objective of this paper is to investigate the effect of cartographic properties on updating cadastral maps. This depends on studying the effect of conversion the projection and the datum of the cadastral maps of the study area from (datum: nahrwan34, projection: lambert confo
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More