
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThis paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show MoreIn this work, the effect of variation of semi-angle of the conical part on the vibration characteristics of cylindrical-conical coupled structure is investigated. The shell is made of polyester resin reinforced by continuous E-glass fibers. The case is analyzed experimentally and numerically for orthotropic shell structures. The experimental program is conducted by exciting the fabricated structure by an impact hammer and monitoring the response using an attached accelerometer for different semi-angles of the conical part.
Software named SIGVIEW is used to perform the signal processing on the acquired signal in order to measure the natural frequencies and the corresponding mode shapes. The numerical investigation is achieved using ANS
This research focused on clarifying the relationship strategic decisions for operations management & performance excellence organizational, The research emerges from a problem which explained by many application questions. Special questionnaire has been prepared for this purpose distributed (72) to sample of management levels (Top, middle) in the General company for mining industries and aquatic Insullation & the General company of batteries industry, The research has tried to test a number hypotheses related to the relation and regression among the variables of the research, and the differences among the <
... Show MoreThe present study aims at knowing the effect of discussion method for students of fifth grade in preparatory school.
Methodology of the Study:
In order to achieve the objective of the study, the researcher chooses non-randomly the preparatory school affiliated to the District Chamchamal \ Suliemnaniya. The sample attained 64 students in 32 per group (control and experimental) groups. The researcher used the discussion method which was applied on experimental group. She uses the traditional method on the control group.
The researcher matched the two group in ago, intelligence, marks at the Kurdish Language in the previous year , pretest and posts for the indepe
... Show MoreIn this paper to isolate and study the properties of the cyclooxygenase-2 (EC: 1.14.99.1) enzyme in the blood of a patient suffering from rheumatoid arthritis and study the effect of natural products of the Soapwort on the activity of purified enzyme. The study involves taking 30 ml of blood from an adult woman 40 years old, who suffers from rheumatoid arthritis disease for 13 years. Serum is separated and subjected to a series of purification processes including: precipitation by ammonium sulfate, filtration by centrifugation radiator, dialysis in presence of ammonium bicarbonate, separation using the technology of ion exchange, lipholization and then estimating approximate molecular weight of the enzyme using gel filtration techni
... Show MoreAS Salman, SK Hameed…, Karbala Journal of Physical Education Sciences, 2020
Background: Beta-thalassemia major is the most common monogenic known disorder in the Middle East, characterized by anomalies in the synthesis of the beta chains of hemoglobin resulting in variable phenotypes ranging from severe anemia to clinically asymptomatic Individuals. This study aimed to evaluate salivary flow rate and salivary IgA in β-thalassemia major patients. Since many oral and systemic conditions manifest themselves as changes in the flow and composition of saliva the dental practitioner is advised to remain up-to-date with this issue. Materials and methods: The study samples consist of (60) subjects, patients group composed of (30) patients with β –thalassemia major, age rang (5-23) years and (30) healthy locking
... Show MoreThe purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)