The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreAbstract
This study highlights the importance of Iraq in the analysis of foreign trade and economic growth for the period (1980 - 2013) is an attempt to determine the equilibrium relationship long term and short term between these two variables were used ARDL model to explain the economic relationship between the two variables.
To achieve the objectives of the research has been the standard model estimate after testing the stability of exports X data series, and imports M, and GDP current prices, and exchange rate EXR, and verify the existence of a joint integration relationship between these variables.
In order to achieve the objectives of the research it
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreIn Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due
... Show MoreThis study comprised three traverses extending parallel through the Northern, Central and Southern Mahmudiya districts, and perpendicular to the course of the Euphrates River. They were identified to collect (15) soil samples and some water samples as distributed within the land cover classes of the study area. Those classes were determined by visual interpretation and supervised classification for Landsat (TM) images obtained in August/2007. The digital classification was based on Maximum Likelihood method using six spectral bands excluding the thermal band. Chemical and physical laboratory analysis for the soil characteristics was performed to determine the types of land degradation in the study area.
The results showed that the hig
Assessment of annual wind energy potential for three selected sites in Iraq has been analyzed in the present work. The wind velocities data from August 2014 to July 2015 were collected from the website of Weather Underground Organization (WUO) at stations elevation (35m, 32m, and 17m) for Baghdad, Najaf, and Kut Al-Hai respectively. Extrapolation of stations elevation and wind velocities was used to estimate wind velocities at (60m, 90m, and 120m). The objectives are to analyze the wind speed data and assess the wind energy potential for wind energy applications. Computer code for MATLAB software has been developed to solve the mathematical model. The results are presented as a monthly and annual average for wind velocities, standard deviat
... Show MoreThis paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and this load w
... Show MoreNuclear emission rates for nucleon-induced reactions are theoretically calculated based on the one-component exciton model that uses state density with non-Equidistance Spacing Model (non-ESM). Fair comparison is made from different state density values that assumed various degrees of approximation formulae, beside the zeroth-order formula corresponding to the ESM. Calculations were made for 96Mo nucleus subjected to (N,N) reaction at Emax=50 MeV. The results showed that the non-ESM treatment for the state density will significantly improve the emission rates calculated for various exciton configurations. Three terms might suffice a proper calculation, but the results kept changing even for ten terms. However, five terms is found to give
... Show MoreIn the present work, Uranium (238U), Thorium (232Th) and Potassium (40K) specific activity concentration in (Bq/kg) was measured in five different types for wheat flours that are available in the Iraqi markets. The gamma spectrometry method with an NaI (Tl) detector has been used for radiometric measurements. Calculations of radium equivalent activity, annual effective dose equivalent, external hazard index (Hex), internal hazard index (Hin), representing gamma index and gamma dose rate in all flour samples were 17.98132 Bq/kg, 0.0100334, 0.04502, 0.04857, 0.06872, 0.125883 and 8.181244 respectively. It is found that the average of specific activity concentration of wheat flour sam
... Show More