Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Objectives: The study aims to: (1) assess the prevalence of phantom vibration and ringing syndrome among
nurses, (2) determine the level of job-related stress among those nurses who are working at teaching hospitals in
Al- Nasiriyah city, and (3) identify the association between job-related stress and experience of phantom
vibration and ringing syndrome.
Methodology: : A descriptive design, cross-sectional study was used for the present study was carried out
from 4th December, 2017 to the 4th April, 2018 in order to determine the association of Phantom
Vibration and Ringing Syndrome with Job - Related Stress among nurses at Teaching Hospitals in AlNasiriyah
City , on a purposive (non-probability) sample was used in t
Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreAcromegaly is ametabolic disorder characterized by an acquired progressive somatic disfigurement, mainly involving the face, extremities and many other organs, that are associated with systemic manifestations, caused by excessive secretion of growth hormone and a resultant persistent elevation of insulin-like growth factor-I concentrations. In more than 90% of cases originates from a monoclonal benign pituitary adenoma. Aim of this study to assess the level of insulin-like growth factor-I (IGF-I) in saliva of acromegalic patients, and to compare it with the basal levels of serum IGF-I. Sixty specimens of serum and saliva collected from two groups of subjects (forty acromegalic patients and twenty healthy persons). The specimens were
... Show MoreThe Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie
... Show MoreIncreasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreThe political movements of Islam are among the most prominent phenomena of the popular uprisings witnessed by the Arab world. However, this rise and the rise of some movements led to many problems on the political theses of Islam, especially those associated with the ideas of Islamic ideologues and their slogan Legitimacy and the authorities as the origin of the divine, and said the application to achieve the Islamic solution, and then became the state in theses of some Islamists a tool to apply the law and then the preservation of religion.
The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of
... Show MoreInfluence of combined square nozzle with helical tape inserted in a constant heat flux tube on heat transfer enhancement for turbulent airflow for Reynolds number ranging from 7000 to 14500 were investigated experimentally. Three different pitch ratios for square nozzle (PR = 5.8, 7.7 and 11.6) according to three different numbers of square nozzle (N = 3, 4 and 5) and constant pitch ratios for helical tape were used. The results observed that the Nusselt number and friction factor for combination with winglets were found to be up to 33.8 % and 21.4 %, respectively higher than nozzle alone for pitch ratio PR=5.8. The maximum value of thermal performance for using combination with winglets was about 1.351 for pitch ratio= 5.8. Nusselt numb
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreAbstract:
Objectives: This study aims to (1) find out the association between patients' age, years of getting the disease, and their spiritual coping ability, and (2) investigate the differences in illness perception and spiritual coping ability between gender groups, level of education groups, monthly income groups, residence groups and satisfaction with health services groups.
Methodology
A descriptive correlational design is used in this study. The study sample includes a convenience sample of (158) patients with chronic kidney failure.
The study instrument consists of two parts; the first one focuses on participants’ sociodemographic characteristics, and the second part deals with participants’ spiritual coping by us