The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
For more than seven decades, the Palestinian-Israeli conflict has not ended, and every one claims his right to the land, waters, airspace and wealth of Palestine. This conflict was reflected in the political, military, social and cultural aspects, and the cinema had a prominent role in conveying messages to the world about this conflict. On the geopolitical dimensions and their impact on the cinematic image in the films of the Palestinian cause), the researchers divided the research into four frameworks that came as follows: (methodological framework) and included the research problem, its importance, research objectives, research limits and sealing the chapter by defining the terms. And (theoretical framework): it was divided into two s
... Show Moreسها علي حسين, هويدة إسماعيل إبراهيم, Journal of Physical Education, 2017 - Cited by 1
The special core analysis tests were accomplished on a set of core plugs for Mishrif Formation (mA, mB1, and mB2cde/mC units) in West Qurna/1 oilfield, southern Iraq. Oil relative permeability (Kro) data and the Corey-type fit of the data as functions of the brine saturation at the core outlet face for individual samples in the water-oil imbibition process to estimate relative permeability measurements by the centrifuge method were utilized. Identical correlations for oil and water relative permeabilities were extracted by steady-state and unsteady-state methods. For the mA samples, the gas-water capillary pressure curves were within a narrow range (almost identical) indicating that mA is a homogeneous unit. Kro curves for three mB2
... Show MoreThe special core analysis tests were accomplished on a set of core plugs for Mishrif Formation (mA, mB1, and mB2cde/mC units) in West Qurna/1 oilfield, southern Iraq. Oil relative permeability (Kro) data and the Corey-type fit of the data as functions of the brine saturation at the core outlet face for individual samples in the water-oil imbibition process to estimate relative permeability measurements by the centrifuge method were utilized. Identical correlations for oil and water relative permeabilities were extracted by steady-state and unsteady-state methods. For the mA samples, the gas-water capillary pressure curves were within a narrow range (almost identical) indicating that mA is a homogeneous unit. Kro curves for thr
... Show MoreExperience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of
... Show MoreIn this paper, we investigate the impact of fear on a food chain mathematical model with prey refuge and harvesting. The prey species reproduces by to the law of logistic growth. The model is adapted from version of the Holling type-II prey-first predator and Lotka-Volterra for first predator-second predator model. The conditions, have been examined that assurance the existence of equilibrium points. Uniqueness and boundedness of the solution of the system have been achieve. The local and global dynamical behaviors are discussed and analyzed. In the end, numerical simulations are confirmed the theoretical results that obtained and to display the effectiveness of varying each parameter