Preferred Language
Articles
/
ijs-3606
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of all image pixels based on a 1D logistic map to build IP table. Secondly, a new S-Box based on 2D-Henon chaos was created using more confusion to replace G-channel image data. Finally, design of a modern image encryption approach. This approach uses the key process confusion and diffusion operation and depend on IP and S-Box proposals in the encryption process and several shuffling operations using the 3D- Lornez chaos theory. Theoretical research and simulation suggest that starting sensitivity value of this method is high, has high protection, and encryption speed. Moreover, it also holds the value of the neighboring RGB close to zero. The studies show that the information security capabilities would be both safer and more efficient, as a result of our image quality assessment study. Number of Differential Pixel Rate Change Attacks (NPSR), Unified Average Altered Intensity (UACI), are quality and strength of encryption processing are proved by pixel correlation, Entropy to be good results.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Structural elements of composition design for fabrics image Image footage model
...Show More Authors

End of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the struct

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On the Connection between the Dynamical System and the Ellis Compactification with Transitive Pointed System
...Show More Authors

In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Image Processing Approaches as a Diagnostic Parameter to Determine Pollution by Using Satellite Imagery, Northern Iraq
...Show More Authors

     This work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
On The Static Reliability Of Binary-State And Multi-State K-Out-Of-N:G Systems
...Show More Authors

The k-out-of-n:G (or k/n:G) system structure is a very popular of redundancy in
fault-tolerant systems, with wide applications in so many fields. This paper presents
two states of multi-state k/n:G systems. The first part, we present the definition that
introduced by Al-Neweihi et al [1], where the values are the same with respect
to all system states and we show that there exists an alternative equivalent definition
to Al-Neweihi's definition. In the second part of this paper we give more general
definition proposed by Huang et al [2], where it allows different values with
respect to different system states and we provide there exists an equivalent definition
to Huang's definition when the values are increasing.

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
MVSCA: Multi-Valued Sequence Covering Array
...Show More Authors

This paper discusses the limitation of both Sequence Covering Array (SCA) and Covering Array (CA) for testing reactive system when the order of parameter-values is sensitive. In doing so, this paper proposes a new model to take the sequence values into consideration. Accordingly, by superimposing the CA onto SCA yields another type of combinatorial test suite termed Multi-Valued Sequence Covering Array (MVSCA) in a more generalized form. This superimposing is a challenging process due to NP-Hardness for both SCA and CA. Motivated by such a challenge, this paper presents the MVSCA with a working illustrative example to show the similarities and differences among combinatorial testing methods. Consequently, the MVSCA is a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Fabrication of multi-junction solar cells
...Show More Authors

Fabrication of solar cell prepared by thermal spray and vacuum thermal evaporation method on silicon wafer(n-type) and studying its efficiency. The film have been deposited on three layers(ZnO then CdS and CdTe) on Si and glass respectively.Direct energy gap was calculated and equal to (4.3,3.4,3)eV and indirect energy gap equal to (3.5,2.5,1.5)eV respectively . Efficiency was calculated for the cell of area 2cm2 it was equal to 0.14%.

View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

View Publication Preview PDF
Scopus (1)
Scopus Crossref