the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
ABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreThis study deals with microfacies analysis, diagenetic facies, environmental interpretations related to sequence stratigraphy for Early – Middle Miocene in selected wells within Balad (Ba-X) and East Baghdad (EB-Z) oil fields.
Seven major microfacies were recognized in the successions of the study wells, these facies were used to recognize six facies association (depositional environments) within the study oil fields: deep marine, toe of slope, open marine, restricted interior platform, evaporitic interior platform and brackish interior platform. The facies associations interpreted were based on texture and obtainable fauna.
The Early - Middle Miocene succession was deposited during two depositional cycles as a t
... Show MoreThe research aims to: build and record a measure of cognitive participation among second-year female students at the College of Physical Education and Sports Sciences, University of Baghdad. The researchers used the descriptive approach in the survey style for the research sample. The sample was selected from female students and divided into: (10) female students for the survey sample, and (80) female students for the construction and codification sample. The data were statistically analyzed by the researchers using SPSS, the T-test for independent and correlated samples, Pearson's simple correlation coefficient, Cronbach's alpha, Chi-square, and Spearman-Brown. They were recruited for the samples. The study concluded that constr
... Show MoreA rapid high sensitive and inexpensive economic method has been developed for the Determination of phenoxazine by using molecular spectrophotometry. The method is based on the oxidation of phenoxazine by potassium (meta)periodate in acidic medium. The oxidation conditions were selected to enhance the sensitivity and the stability of the pink colored species which shows an absorption maximum at 530 nm. The Beer’s law was obeyed for phenoxazine concentration range from 1 to 6 µg mL-1 with 0.003 µg mL-1 detection limit and provided variation coefficients between 0.4 to 1.7 %. This method was successfully applied for the determination of phenoxazine in aqueous samples
In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreThe cloud point extraction technique has become increasingly popular in recent years for trace metal separation and preconcentration. When heated to a specific temperature, cloud point extraction utilizes the property of nonionic surfactants in aqueous solutions to generate micelles and become turbid (so-called cloud point temperature). For analytical chemists, developing a simple and selective technology for the separation and determination of metals and medicinal drugs is a critical concern. Therefore, a sensitive, accurate, and green cloud point extraction (CPE) procedure was developed for the micro-determination of metal cations like zinc (II) and cadmium (II) in food samples. Triton X–114 and 1-(4-(Phenyldiazenyl) phenyl) a
... Show More