Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
This research aims to identify the relationship between occupational hypocrisy and organizational strategic success, It was done by analyzing the correlations and influence between variables, applied to a random sample of university professors at the University of Kufa faculty of administration and economic.
The main tool for data collection is the survey were questionnaires were distributed randomly to the professors , and (43) questionnaires were returned, and test its validity by using (SEM) (Structural Equation Modeling), Hypothesis has been tested by using Statistical Package for Social Sciences (SPSS v. 18), The research found a set of conclusions:(The occupational hypocrisy has
... Show MoreThe increase in population resulted in an increase in the consumption of water. The present work investigates the performance of a recycling solar- powered greywater treatment system for the purposes of irrigation, used to reduce the amount of waste grey water and reduce electricity consumption and reduce the costs of constructing large scale water treatment plants. The system consumes about 3814W per hour and provides water treatment about 1.4 m3 per day. The proposed system is designed to residential, office and governmental buildings application. Tests are conducted in an office building at the Ministry of Science and Technology site in Baghdad. Laboratorial water samples testing analyses are co
... Show MoreThe research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi
... Show MoreThe steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortr
... Show MoreA Mini-TEA CO2 laser system was designed and operated to obtain a pulse at 10.6 μm. Output energy of 30 mJ, with preionization pins, and pulse duration of 100ns were obtained. While an output energy of 6mJ and pulse duration of 100 ns in absence of pre-ionization were obtained. The system was operated with Ernest profile main-discharge electrodes. Dependencies of supply voltage and output laser energy on the pressure inside laser cavity were investigated as well as dependencies of supply voltage and output energy on the main capacitor(8CO2 : 8N2 : 82He :2CO). Efficiency of was calculated to be 4.4%.
The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing
Phenol is one of the worst-damaging organic pollutants, and it produces a variety of very poisonous organic intermediates, thus it is important to find efficient ways to eliminate it. One of the promising techniques is sonoelectrochemical processing. However, the type of electrodes, removal efficiency, and process cost are the biggest challenges. The main goal of the present study is to investigate the removal of phenol by a sonoelectrochemical process with different anodes, such as graphite, stainless steel, and titanium. The best anode performance was optimized by using the Taguchi approach with an L16 orthogonal array. the degradation of phenol sonoelectrochemically was investigated with three process parameters: current de
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreTax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information
... Show More