This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack.
It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe present study aimed to evaluate the levels of total immunoglobulin E and percentage count of eosinophil in some of allergic disease. Blood sample collected from 210 patients (110 female, 100 male) with allergic disease (allergic asthma, allergic rhinitis, and urticaria) their age between 10-70 years and 50 healthy control their age between 23-52 years. A highly significant (P<0.01) increase in the mean serum total IgE in patients with asthma (503.54 ± 63.49 IU/ml), Allergic rhinitis (442.77 ± 95.76 IU/ml) and urticaria (489.53 ± 69.68 IU/ml) as a compared with healthy controls (23.67 ± 5.81 IU/ml).There was a significant difference in percentage count of eosinophil in patients groups allergic asthma 4.37 ± 0.52% ,allergic rhinitis
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the
... Show MoreThe corrosion of metals is of great economic importance. Estimates show that the quarter of the iron and the steel produced is destroyed in this way. Rubber lining has been used for severe corrosion protection because NR and certain synthetic rubbers have a basic resistance to the very corrosive chemicals particularly acids. The present work includes producing ebonite from both natural and synthetic rubbers ; therefore, the following materials were chosen to produce ebonite rubber: a) Natural rubber (NR). b) Styrene butadiene rubber (SBR). c) Nitrile rubber (NBR). d) Neoprene rubber (CR) [WRT]. The best ebonite vulcanizates are obtained in the presence of 30 Pphr sulfur, and carbon black as reinforcing filler. The relation between
... Show MoreE-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac