The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreWe consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through
... Show MoreThis article briefly analyzing contemporary works appeared in theater writer from Latin America, which comes within the theme of "power." Latin American Literature, such as two-way extremely clear: the vanguard of social and attention, have arrived at certain moments to some extent be regarded as a two-way rival. That desire to participate in the revolution of expression and artistic significance, has appeared evident in the literature of Latin America in the late nineteenth century and ended in the third decade of the twentieth century. The writers that stage would prefer not to serve the objectives of the revolution of Arts own but the objectives of social and political revolution that stimulate the world. These acts were issued
... Show MoreAbstract:
Organizations need today to move towards strategic innovation, which means the analysis of positions, especially the challenges faced by the change in the external environment, which makes it imperative for the organization that you reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures. Now this research dilemma intellectual two-dimensional, yet my account in not Take writings and researchers effect strategic innovation in re-engineering business processes, according to science and to inform the researcher, and after the application represented in the non-application of such resear
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In order to achieve optimal plant growth and production, essential nutrients must be readily available in adequate quantities and in a balanced proportion to give a good yield, especially broccoli which has health benefits that may not be found in many other plants. For this purpose, this experiment was carried out during the seasons 2019/2020 in the botanical garden of the Department of Biology, College of Science for Women, University of Baghdad, to study the effects of nitrogen and sulphur and their interaction on eight parameters reflecting the overall traits of vegetative growth, yield, and chlorophyll content of broccoli Brassica oleracea L. (var. italic JASSMINE F1 Hybrid). A factorial design with three replicates was use
... Show MoreThis research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the BL technique, and the second control group (25) students have been taught in the traditional method.
Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend
... Show MoreAg2O (Silver Oxide) is an important p-type (in chasm to most oxides which were n-type), with a high conductivity semiconductor. From the optical absorbance data, the energy gap value of the Ag2O thin films was 1.93 eV, where this value substantially depends on the production method, vacuum evaporation of silver, and optical properties of Ag2O thin films are also affected by the precipitation conditions. The n-type and p-type silicon substrates were used with porous silicon wafers to precipitate ±125 nm, as thick Ag2O thin film by thermal evaporation techniques in vacuum and via rapid thermal oxidation of 400oC and oxidation time 95 s, then characterized by measurement of
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
This research included important results, th
Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.