The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
The study aimed at interpreting the role of architectural design quality in in build competitiveness model in accordance with the proposal included the idea of architectural design quality for its removal; interesting design factors of the environment, good design of the spaces, and design aesthetic explanatory variable. The competitiveness dimensions; the level of innovation, stimulate research, and the quality of the company's products, and activating the role of human resources, entrepreneurship, profitability, market share and competitiveness, variable responsive. The study of construction companies in the Ministry of Housing and Construction has taken the Iraqi society for the study. The sample consisted of (48) manage
... Show Moreملاحظات اولية على قانون الانتخابات ونتائجها
اثر انعدام الاهلية على الشركة التضامنية
Microservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re
... Show Moreتعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها ال
... Show Moreتأثير تكوين الشخصية على السلوك السياسي
The freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This be
... Show MoreThe study search for the history and the beginning of Faluja city in addition to its growing and developing stages , as well as its planning nature through ottoman era depending on aerial map of Falluja in 1919 as it is the oldest map from Baghdad Real Estate Department, this mentioned map is characterized by the accuracy of the information,
MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix. In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over of length and 28 have been found.