In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of all image pixels based on a 1D logistic map to build IP table. Secondly, a new S-Box based on 2D-Henon chaos was created using more confusion to replace G-channel image data. Finally, design of a modern image encryption approach. This approach uses the key process confusion and diffusion operation and depend on IP and S-Box proposals in the encryption process and several shuffling operations using the 3D- Lornez chaos theory. Theoretical research and simulation suggest that starting sensitivity value of this method is high, has high protection, and encryption speed. Moreover, it also holds the value of the neighboring RGB close to zero. The studies show that the information security capabilities would be both safer and more efficient, as a result of our image quality assessment study. Number of Differential Pixel Rate Change Attacks (NPSR), Unified Average Altered Intensity (UACI), are quality and strength of encryption processing are proved by pixel correlation, Entropy to be good results.
In this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreLet G be a graph, each edge e of which is given a weight w(e). The shortest path problem is a path of minimum weight connecting two specified vertices a and b, and from it we have a pre-topology. Furthermore, we study the restriction and separators in pre-topology generated by the shortest path problems. Finally, we study the rate of liaison in pre-topology between two subgraphs. It is formally shown that the new distance measure is a metric
The purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat
... Show MoreThe production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.
This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت
... Show MoreSummary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20
... Show MoreThe ground state densities of unstable neutron-rich 8He and 17B exotic nuclei are studied via the framework of the two-frequency shell model (TFSM) and the binary cluster model (BCM). In TFSM, the single particle harmonic oscillator wave functions are used with two different oscillator size parameters βc and βv where the former is for the core (inner) orbits and the latter is for the valence (halo) orbits. In BCM, the internal densities of the clusters are described by single particle Gaussian wave functions. Shell model calculations for the two valence neutrons in 8He and 17B are performed via the computer code OXBASH. The long tail performance is clearly noticed in the calculated neutron and matter density distributions of these nucl
... Show More