Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Several methods have been developed for routing problem in MANETs wireless network, because it considered very important problem in this network ,we suggested proposed method based on modified radial basis function networks RBFN and Kmean++ algorithm. The modification in RBFN for routing operation in order to find the optimal path between source and destination in MANETs clusters. Modified Radial Based Neural Network is very simple, adaptable and efficient method to increase the life time of nodes, packet delivery ratio and the throughput of the network will increase and connection become more useful because the optimal path has the best parameters from other paths including the best bitrate and best life link with minimum delays. The re
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreThe objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreThe study aimed to estimate the content of lead and determine the quality of the internal coating of metal cans through electrical conductivity as well as to determine the accuracy of the information card for some types of canned food that available in local markets. The information card test showed that all of these samples contained the name of the food, trade mark, country origin, weight, and components, as was indicated by the company producing in all of them except for the C12 sample which was otherwise, and the batch number was mentioned in all samples except for the C3 and C17 which was not clear and not mentioned in the C21, and the validity period was observed (produce and fini
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreThe genetic toxicity of aqueous and alcoholic extracts of seeds of Peganum harmala L. was evaluated on the onion roots ,using concentrations 10,25,50,100 and 200 % w/v of extracts and periods of exposure 24,48 and 74 hours. The results indicated that the Peganum harmala significantly decreased root growth rate of onion root at all concentrations and treatment periods in comparison to the control , the growth of the root decreased when increasing the extract concentration.The EC50value of aqueous extracts was 50% and for alcohol extract was 25% ,thus the alcohol extract was most effective in the growth rate of the roots from the aqueous extract. The results also indicated that the mitotic index of Allium cepa was signifi
... Show More