Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.
Vol. 6, Issue 1 (2025)
Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreAn experiment was carried out to study the effect of soil organic carbon (SOC) and soil texture on the distance of the wetting front, cumulative water infiltration (I), infiltration rate (IR), saturated water conductivity (Ks), and water holding capacity (WHC). Three levels ( 0, 10, 20, and 30 g OC kg-1 ) from organic carbon (OC) were mixed with different soil materials sandy, loam, and clay texture soils. Field capacity (FC) and permanent wilting point (PWP) were estimated. Soil materials were placed in transparent plastic columns(12 cm soil column ), and water infiltration(I) was measured as a function of time, the distance of the wetting front and Ks. Results showed that advance we
The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.
Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.
The interaction between comet Hale-Bopp tail with the solar wind is investigated in the present paper using magneto-hydrodynamic (MHD) numerical simulation, which accounts for the presence of the interplanetary magnetic field (IMF). The simulation is based on three-dimensional Lax-Wendroff explicit scheme, providing second-order accuracy in space and time. The ions produced from the nucleus of the comet will add considerable effects on the microstructure of the solar wind, thus severely altering its physical properties. The present simulation focuses on careful analysis of these properties by means of simulating the behavior of the comet Hale-Bopp’s tail at 1 AU from the sun. These properties include the changes of the plasma density,
... Show MoreThe purpose of this research is to explain the effect of the dropping of three zeroes from Iraqi dinar on the basic role of the dinar and derivative and dynamic in transaction of Iraqi economic. the importance of this research comes from the effect of this operation on the evaluation of the exchange between the individuals of Iraqi society and the other between the Iraqi individuals and the foreign whom use the Iraqi dinar as a tool for exchange also the effect of the operation on the reserves of the Iraqi dinar the results of this research are as the following:-
1-the operation of dropping of zeroes must be associated with increase of the sharing of economic sectors wi
... Show MoreSolar module operating temperature is the second major factor affects the performance of solar photovoltaic panels after the amount of solar radiation. This paper presents a performance comparison of mono-crystalline Silicon (mc-Si), poly-crystalline Silicon (pc-Si), amorphous Silicon (a-Si) and Cupper Indium Gallium di-selenide (CIGS) photovoltaic technologies under Climate Conditions of Baghdad city. Temperature influence on the solar modules electric output parameters was investigated experimentally and their temperature coefficients was calculated. These temperature coefficients are important for all systems design and sizing. The experimental results revealed that the pc-Si module showed a decrease in open circuit v
... Show MoreThe possible effects of COVID-19 vaccines on reproductive health and male fertility in particular have been discussed intensely by the scientific community and the public since their introduction during the pandemic. On news outlets and social media platforms, many claims have been raised regarding the deleterious effects of COVID-19 vaccines on sperm quality without scientific evidence. In response to this emerging conflict, we designed this study to evaluate and assess the effect of the Pfizer-BioNTech mRNA COVID-19 vaccine on male fertility represented by the semen analysis parameters.
The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.