This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack.
In current research Copper was employed for preparing a ternary system of Al–Si alloy in different (0.2–2.5 wt. %) the best was taken is (1.5%wt) of copper that circumstances of solidification for improving the mechanical performance of the available in aluminium alloy. Cast iron molds were prepared to obtain tensile strength testing specimens. Alloys were prepared by employing gas furnaces. The molten metal was poured into a preheated cast-iron mold. The obtained alloy structures were studied using an X-ray diffractometer and optical microscopy. The mechanical performance of the prepared alloys was examined under the influence of different hardening conditions in both heat and non-heat-treated conditions. The outcomes showed at the
... Show MoreBackground:Â Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.
Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreIn our normal life, we sometimes need a process of replacing something with another to get out of the stereotype. From this point of view, Mahmood’s attempted in the year 2020 to replace the content in the first main e-abacus diagram. He found the general rule for finding the value of the new partition after the replacement from the original partition. Here we raise the question: Can we find the appropriate mechanisms for the remainder of the main e-abacus diagram?
The research deals with the problem of visual pollution, as it is one of the most important urban problems that cities suffer from. The concept of visual pollution has recently emerged to describe the deformation and degradation of the urban environment. Visual pollution is defined as any component of the surrounding environment that is inconsistent and not homogeneous with its natural and human components. The volume of visual pollution has doubled due to the non-compliance with the laws, regulations and controls set by the Municipality of Baghdad by the citizens, and to the weak municipal role that the municipality plays in implementing these laws. Therefore, it has become necessary to know the manifestations of visual pollution and th
... Show MoreIn this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A
... Show More