Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThis paper presents experimentally a new configuration of shear connector for Steel-Concrete-Steel (SCS) sandwich beams that is derived from truss configuration. It consists of vertical and inclined shear connectors welded together and to cover steel plates infilled with concrete. Nine simply supported SCS beams were tested until the failure under a concentrated central load (three- point bending). The beams were similar in length (1100mm), width (100mm), and the top plate thickness (4mm). The test parameters were; beam thickness (150, 200, 250, and 300mm), the bottom plate thickness (4, and 6mm), the diameter of the shear connectors (10, 12, and 16mm), and the connector spacing (100, 200, and 250mm). The test results sh
... Show MoreFriction Stir Welding (FSW) is one of the most effective solid states joining process and has numerous potential applications in many industries. A FSW numerical tool, based on ANSYS F.E software, has been developed. The amount of the heat gone to the tool dictates the life of the tool and the capability of the tool to produce a good processed zone. Hence, understanding the heat transfer aspect of the friction stir welding is extremely important for improving the process. Many research works were carried out to simulate the friction stir welding using various softwares to determine the temperature distribution for a given set of welding conditions. The objective of this research is to develop a finite element sim
... Show MoreThe Plerion nebula is characterized by its pulsar that fills the center of the supernova remnant with radio and X-ray frequencies. In our galaxy there are nine naked plerionic systems known, of which the Crab Nebula is the best-known example. It has been studied this instance in order to investigate how the pulsar energy affect on the distribution and evolution of the remnant as well as study the pulsar kick velocity and its influence on the remnant. From the obtained results it's found that, the pulsar of the Crab Nebula injects about (2−3)𝑥 1047 erg of energy to the remnant, although this energy is small compared to the supernova explosion energy which is about 1051 erg but still plays a significant role in the distribution and the m
... Show MoreThis research focused on clarifying the relationship strategic decisions for operations management & performance excellence organizational, The research emerges from a problem which explained by many application questions. Special questionnaire has been prepared for this purpose distributed (72) to sample of management levels (Top, middle) in the General company for mining industries and aquatic Insullation & the General company of batteries industry, The research has tried to test a number hypotheses related to the relation and regression among the variables of the research, and the differences among the <
... Show MoreThe present study aims at knowing the effect of discussion method for students of fifth grade in preparatory school.
Methodology of the Study:
In order to achieve the objective of the study, the researcher chooses non-randomly the preparatory school affiliated to the District Chamchamal \ Suliemnaniya. The sample attained 64 students in 32 per group (control and experimental) groups. The researcher used the discussion method which was applied on experimental group. She uses the traditional method on the control group.
The researcher matched the two group in ago, intelligence, marks at the Kurdish Language in the previous year , pretest and posts for the indepe
... Show More