In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of all image pixels based on a 1D logistic map to build IP table. Secondly, a new S-Box based on 2D-Henon chaos was created using more confusion to replace G-channel image data. Finally, design of a modern image encryption approach. This approach uses the key process confusion and diffusion operation and depend on IP and S-Box proposals in the encryption process and several shuffling operations using the 3D- Lornez chaos theory. Theoretical research and simulation suggest that starting sensitivity value of this method is high, has high protection, and encryption speed. Moreover, it also holds the value of the neighboring RGB close to zero. The studies show that the information security capabilities would be both safer and more efficient, as a result of our image quality assessment study. Number of Differential Pixel Rate Change Attacks (NPSR), Unified Average Altered Intensity (UACI), are quality and strength of encryption processing are proved by pixel correlation, Entropy to be good results.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThe fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show MoreLet R be a ring with identity and Ą a left R-module. In this article, we introduce new generalizations of compressible and prime modules, namely s-compressible module and s-prime module. An R-module A is s-compressible if for any nonzero submodule B of A there exists a small f in HomR(A, B). An R-module A is s-prime if for any submodule B of A, annR (B) A is small in A. These concepts and related concepts are studied in as well as many results consist properties and characterizations are obtained.
The flow measurements have increased importance in the last decades due to the shortage of water resources resulting from climate changes that request high control of the available water needed for different uses. The classical technique of open channel flow measurement by the integrating-float method was needed for measuring flow in different locations when there were no available modern devices for different reasons, such as the cost of devices. So, the use of classical techniques was taken place to solve the problem. The present study examines the integrating float method and defines the parameters affecting the acceleration of floating spheres in flowing water that was analyzed using experimental measurements. The me
... Show MorePrediction of accurate values of residual entropy (SR) is necessary step for the
calculation of the entropy. In this paper, different equations of state were tested for the
available 2791 experimental data points of 20 pure superheated vapor compounds (14
pure nonpolar compounds + 6 pure polar compounds). The Average Absolute
Deviation (AAD) for SR of 2791 experimental data points of the all 20 pure
compounds (nonpolar and polar) when using equations of Lee-Kesler, Peng-
Robinson, Virial truncated to second and to third terms, and Soave-Redlich-Kwong
were 4.0591, 4.5849, 4.9686, 5.0350, and 4.3084 J/mol.K respectively. It was found
from these results that the Lee-Kesler equation was the best (more accurate) one
This study aims to determine the petrophysical characteristics of the three wells in the Kifl Oilfield, central Iraq. The well logs were used to characterize hydrocarbon reservoirs to assess the hydrocarbon prospectivity, designate hydrocarbon and water-bearing zones, and determine the Nahr Umr Formation's petrophysical parameters. The Nahr Umr reservoir mainly consists of sandstone at the bottom and has an upper shale zone containing a small proportion of oil. The geophysical logs data from three oil wells include gamma-ray, resistivity, neutron, density, acoustic, and spontaneous potential logs. A gamma-ray log was employed for lithology differentiation, and a resistivity log was used to determine the response of distinct zones
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
This study aims to clarify the role of Iraqi satellite channels in spreading negative values among university youth; and the tendency of this segment to simulate the descending behaviors and pseudo-peculiar concepts of our society, which are displayed through the screens of these channels, based on the relevant media literature such as scientific references and the results of previous studies and research.
The study followed the survey methodology to examine the public based on the questionnaire as a research tool, which was distributed to a sample of male and female students of Baghdad University enrolled in the university for the academic year 2011-2012.
In order to achieve the specific objectives of this research
... Show MorePre-breakdown phenomenon was investigated within the two, non-mixed dielectric liquids; transformation oil and cresol. Finite element technique was used to follow the initiation and growth of plasma channels (streamer discharge) within pin-plane configuration. That was done for different spacing between the pin-electrode and the liquid-liquid interface. Streamer growth model assumed that, the streamer initiation occurs at the region of the highest value of electric field. Our study shows that the streamer initiates at the tip of the pin and growths toward the other electrode. The study shows, too, that the streamer path controlled by the difference of permittivity of the two liquids and spacing distance of the liquid-liquid interface fro
... Show More