Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate numbers of polynomial equations via Lagrange interpolation to perform pixel diffusion.Simulations have been accomplished in order to evaluate the effectiveness of suggested technique, the Experimental results demonstrate that the proposed method can supply sufficient security for the confidentiality of images.
This paper provides an identification key to the species of Orthetrum Newman, 1833 (Odonata, Libellulidae), including six species that were collected from different localities in Iraq.
The species of O. anceps (Schneider, 1845) is registered as a new record in Iraq; the most important characters which are used in diagnostic key are included
Objective: The study aimed to identify the adolescents' family meal eating patterns, and find out the relationship between adolescents' family meal eating patterns and their weight control behaviors. Methodology: A descriptive study was conducted on impact of adolescents' family meal eating patterns upon their weight control behaviors in secondary schools at Baghdad city, starting from 20th of April 2013 to the end of October 2014. Non- probability (purposive) sample of 1254 adolescents were chosen from secondary schools of both sides of Al-Karkh and Al-Russafa sectors. Data was collected through a specially
The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreThis paper tackles methods of teaching conversation in Russian to students speaking Arabic. It analyses the differences between the two languages, as well as the difficulties and major errors faced by Arabic speakers studying Russian. Particularly, it looks at the difficulty of transforming spoken language. Finally, the paper suggests ways for teaching spoken language and treating the reasons behind making errors.
Аннотация
Данная статья рассматривает методы преподавания говорения на русском языке для носителей арабского яз
... Show MoreWe have designed, fabricated and studied the vertical axis wind turbine and its characterization. The system has been locally designed to pump water. It is considered as a one of the best options for low speed wind. The turbine has eight blades , each blade is 1.8m in length, and the area dimension of the turbine 3.6 m2 . were investigated the best characterization of the system at low wind speed are Power turbine depends on the wind speed. It was 280 Watt at 6m/s and 160 watt at 5m/s , and the power after the turbine decreasing to factor 1/3. The system torque was 20 N.m , Power coefficient cap 0.29 , Tip speed ratio 0.46. It is suitable to be used in Iraq region , and low cost for get the wat
... Show MoreThis paper deals with finding the approximation solution of a nonlinear parabolic boundary value problem (NLPBVP) by using the Galekin finite element method (GFEM) in space and Crank Nicolson (CN) scheme in time, the problem then reduce to solve a Galerkin nonlinear algebraic system(GNLAS). The predictor and the corrector technique (PCT) is applied here to solve the GNLAS, by transforms it to a Galerkin linear algebraic system (GLAS). This GLAS is solved once using the Cholesky method (CHM) as it appear in the matlab package and once again using the Cholesky reduction order technique (CHROT) which we employ it here to save a massive time. The results, for CHROT are given by tables and figures and show
... Show MoreAbstract:
The aim of the research is to verify the role of organizational trust as an “administrative” dimension of objective importance in the relationships adopted by the Iraqi General Insurance Company with customers, as it is one of the basic pillars in building and succeeding companies, which allows the provision of services with high confidence through the customer relationship management system in order to achieve The company's goal is to gain new customers, retain current customers, increase work in insurance companies, and develop the national economy by increasing the company's sales and profitability. The research
... Show MoreRecently, renewable energy (RE), such as solar energy, sources have proven their importance as an alternative source of fuel. The utilizing of solar energy can contribute to move the world towards relying on clean energy to curb global warming. However, the placement of solar farms is a major priority for planners as it is a critical factor in the succession energy project. This study combines one of the multi-criteria decision-making techniques Analytic Hierarchy Process (AHP) and Geographic Information System (GIS) to assess the suitability of land for establishing solar farms in Iraq. Numerous climatic, geomorphological, economic, and environmental criteria and some exclusionary constraints have been adopted in mode
... Show MoreThis paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show More