This study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to
Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MorePolyaromatic hydrocarbons (PAHs) are a group of aromatic compounds that contain at least two rings. These compounds are found naturally in petroleum products and are considered the most prevalent pollutants in the environment. The lack of microorganism capable of degrading some PAHs led to their accumulation in the environment which usually causes major health problems as many of these compounds are known carcinogens. Xanthene is one of the small PAHs which has three rings. Many xanthene derivatives are useful dyes that are used for dyeing wood and cosmetic articles. However, several studies have illustrated that these compounds have toxic and carcinogenic effects. The first step of the bacterial degradation of xanthene is conducted by d
... Show MoreThe tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1