True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Technological and digital development has allowed the emergence of many methods of producing semantics on social media sites within semiotic and propagandistic frameworks. This is what made the image appear in different molds and shapes, especially as it is the first material for visual perception.
This made the Israeli propaganda discourse use it as an important tool to manage the content of suggestive messages with semiological connotations. By doing so, such tool uses social networking sites as an appropriate environment to achieve those goals, which are related to cases of manipulating emotions and minds. It, moreover, changes convictions, attitudes, trends and behaviors according to what the propaganda planner wants.
Many Isra
This research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreOne of the most important and common problems in petroleum engineering; reservoir, and production engineering is coning; either water or gas coning. Almost 75% of the drilled wells worldwide contains this problem, and in Iraq water coning problem is much wider than the gas coning problem thus in this paper we try to clarify most of the reasons causing water coning and some of applicable solutions to avoid it using the simulation program (CMG Builder) to build a single well model considering an Iraqi well in north of Iraq black oil field with a bottom water drive, Coning was decreased by 57% by dividing into sub-layers (8) layers rather than (4) layers, also it was decreased (Coning) by 45% when perforation numbers and positions was chang
... Show MoreIn this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
Purpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance. Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP. Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the st
... Show MoreThis paper examines the decolonizing methods used by Leslie Marmon Silko in her novel Ceremony (1977) to heal the indigenous people from the patriarchal traditions of the white hegemony. This study aims to emphasize the vulnerable responses of the Pueblo people to the memories of the clan and to highlight Silko’s methods to sustain the history and lifestyle of the indigenous people. Therefore, Silko’s novel can be situated historically and culturally within memory-studies. To analyze the contrasting behaviors of characters, this paper projects the relationship between the collective patriarchal doctrines and that of the individual within the framework of memory studies. Theories of Jan and Aleida Assmann are used here to explore the
... Show MoreThree types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre
... Show MoreSo I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi