The current research aims to reveal the reality of coping the scientific research in Omani universities in the Sultanate of Oman with the requirements of the Fourth Industrial Revolution in the light of Oman’s 2040 vision. It also aims derive some suggestions to develop the scientific research in these institutions. The study has adopted a qualitative approach in which interviews were conducted. The sample consisted of (16) leaders of governmental and private higher education institutions, as well as, some experts in the field of Fourth Industrial Revolution. The theoretical significance of the study is represented by its response to Oman’s vison in 2040. It is further in line with the previous international reports and educational studies suggestions and recommendations, which accentuated the importance of higher education institutions to be ready for the fourth industrial revolution. Its practical significance is represented by its contributions in directing the authority people in the higher education institutions to improve the efforts exerted in the scientific research. Such a step helps to meet the requirements of the fourth industrial revolution and disseminate the importance of be aware of the importance of the fourth industrial revolution and meet its requirements. The study has concluded that the majority of the sample’s opinions (i.e., 69%) regarding the degree of the scientific research to cope with the fourth industrial revolution and Oman’s vision was good. On the contrary, (31%) of the opinions has considered the level of the efforts exerted by the higher education institutions on the scientific research to cope with the fourth industrial revolution limited and weak. Finally, the study has recommended adopting a number of suggested procedures that helps develop the scientific research. Such procedures are represented by shedding light on the skills and international cooperation, activating the international cooperation and community partnerships and improving the styles of teaching and learning.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreNumerical simulations are carried out to evaluate the coherence concept’s effect on the performance regarding the optical system, when observing and imaging the planet’s surface. In numerous optical approaches, the coherence qualities of light sources play an important role. This paper provides an overview about the mathematical formulation of temporal and spatial coherence and incoherence properties of light sources. The circular aperture was used to describe the optical system like a telescope. The simulation results show that diffraction-limited for incoherent imaging system certainly improves the image. Yet, the quality of the image is degraded by the light source's highly spatial and temporal coherence properties, resulting in a
... Show More