The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
This research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MorePraise be to God, Lord of the worlds, and may blessings and peace be upon the most honorable of all creation, Abi Al-Qasim Muhammad, who is the messenger of mercy to the worlds and upon the God of the pure and good companions all
Praise be to God, Lord of the worlds, and may blessings and peace be upon the most honorable of all creation, Abi Al-Qasim Muhammad, who is the messenger of mercy to the worlds and upon the God of the pure and good companions all
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreOne of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la
... Show MoreThis study aimed to investigate the effect of total suspended solids (TSS) on the performance of a continuously operated dual-chamber microbial fuel cell (MFC) proceeded by primary clarifier to treat actual potato chips processing wastewater. The system was also tested in the absence of the primary clarifier and the results demonstrated a significant effect of TSS on the polarization curve of the MFC which was obtained by operating the graphite anodic electrode against Ag/AgCl reference electrode. The maximum observed power and current densities were decreased form 102.42 mW/m2 and 447.26 mA/m2 to 80.16 mW/m2 and 299.10 mA/m2, respectively due to the adverse effect of TSS. Also
... Show MoreResearch indicates that the second half of the twentieth century marked large interests in the service industry by government and private organizations in that one, and the service industry has become the bedrock of plans in achieving economic and social development. From this standpoint felt specialists and researchers the importance of transport modes, including rail, which should be available between Almnltq Civil populated as services organized by the competent authorities to achieve the active participation of citizens in economic and social development in the region and that the term services means economic activities, which are the results Pollack concrete such as accepting the situation and satisfaction them or satisfacti
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More