The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F
... Show MoreReceipt date:6/3/2021 acceptance date:4/5/2021 Publication date:31/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The research in the role of variables contact for non-state actors have become more influential in the current of contemporary events, that related with the reality of seeking services and providing all of that in favor of maintaining the social peace, and ensuring its empowerment in order to make peace and stability outcomes as a real fa
... Show MoreA field experiment was conducted in an agricultural field in Al-Hindia district, Karbala governorate in a silty clay soil during the year 2020. The research included a study of two factors, the first is the depth of plowing at two levels, namely 13 and 20 cm, which represented the main blocks. The second is the tire inflation pressure at two levels, namely (70 and 140 kPa), which represented the secondary blocks. Slippage percentage, field efficiency, leaf area, and 300 grain weight were studied. The experiment was carried out using a split-plot system under a Randomized complete block design, at three replications. The tillage depth of 13 cm exceeds/transcend by giving it the least slippage of (11.01%), the highest field efficiency of (50.
... Show Moreالخلاصة
تعد الانتخابات بمثابة الطريق المؤدي إلى الديمقراطية كونها النمط الأكثر شيوعاً لمشاركة المواطنين في الحياة السياسية للبلدان واختيار ممثليهم في المجالس التشريعية، حيث أن مطلب إجراء انتخابات حرة ونزيهة لم يعد مطلباً داخلياً فحسب بل مطلباً دولياً يصرّ المجتمع الدولي على الوفاء به وهذا يلقي على عاتق كل دولة أن تضع من الضمانات ما يكفل ممارسة هذه الانتخابات ب
... Show MoreA single step extraction-cleanup procedure using porous membrane-protected micro-solid phase extraction (μ-SPE) in conjunction with liquid chromatography–tandem mass spectrometry for the extraction and determination of aflatoxins (AFs) B1, B2, G1 and G2 from food was successfully developed. After the extraction, AFs were desorbed from the μ-SPE device by ultrasonication using acetonitrile. The optimum extraction conditions were: sorbent material, C8; sorbent mass, 20 mg; extraction time, 90 min; stirring speed, 1000 rpm; sample volume, 10 mL; desorption solvent, acetonitrile; solvent volume, 350 μL and ultrasonication period, 25 min without salt addition. Under the optimum conditions, enrichment factor of 11, 9, 9 and 10 for AFG2, AFG1
... Show MoreThe aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as th
... Show More