In this research calculate the ecliptic and equatorial coordinates for the Moon , Sun and Jupiter through 100 years and calculate the distances between the Moon and the Earth , the Sun and the Earth , Jupiter and the Sun, Jupiter and the Earth . From Calculation and discussion the changes in the equatorial coordinate were: Δ , Δ δJ = (22.73+21.93, 23.28+22.99) , and the maximum values and minimum values for the Moon were: Rm(min) = 0.00239,0.00240 and Rm(max) = 0.0027,0.00272 , and Jupiter RJ(min) = 4.99077,4.99966 and RJ(min) = 5.44469,5.45057 , and the periods change preface to calculate the conjunction of the Moon and Jupiter.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreChacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreThe aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
There are many events that took place in Al Mosul province between 2013 and 2018. These events led to many changes in the area under study. These changes involved a decrease in agricultural crops and water due to the population leaving the area. Therefore, it is imperative that planners, decision-makers, and development officials intervene in order to restore the region's activity in terms of environment and agriculture. The aim of this research is to use remote sensing (RS) technique and geographic information system (GIS) to detect the change that occurred in the mentioned period. This was achieved through the use of the ArcGIS software package for the purpose of assessing the state of lands of agricultural crops and
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimum err
... Show MoreThe hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat