The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within average of 65 and MSE within average of 85, indicate that the proposed method has proven successful in its ability to efficiently embedding data.
Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun
... Show MoreMedia studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAn experimental and theoretical investigation of three phase direct contact heat transfer by evaporation of refrigerant drops in an immiscible liquid has been carried out. Refrigerant Rl2 and R134a were used for the dispersed phase, while water and brine were the immiscible continuous phase. A numerical analysis is presented to predict the temperature distribution throughout the circular test column radially and axially is achieved. Experimental measurements of the temperature distribution have been compared with the numerical results and are discussed .A comparison between the experimental and theoretical results showed acceptable agreement and applicability of the derived equations. Comparison with other related work showed similar beh
... Show MoreA summary of zooplankton research done in Peruvian marine waters is presented. We first provide a brief overview of the evolution of zooplankton studies off Peru before reviewing zooplankton biodiversity, regional distribution, seasonal and interannual fluctuation, trophodynamics, secondary production, and modeling are some of these topics. We evaluate research on various meroplankton, macroplankton, mesoplankton, and microplankton groups and provide a list of species from both published and unpublished sources. Three regional zooplankton groups have been identified: A shelf group on the continental shelf dominated by Acartia tonsa and Centropages brachiatus; A slope group on the continental shelf with siphonophores, bivalves, foramin
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreAbstract
We produced a study in Estimation for Reliability of the Exponential distribution based on the Bayesian approach. These estimates are derived using Bayesian approaches. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .we derived bayes estimators of reliability under four types when the prior distribution for the scale parameter of the Exponential distribution is: Inverse Chi-squar
... Show More