E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10
Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreThis study deals with the seismic reflection interpretation of lower Cretaceous Formations in Dhufria area, including structural and stratigraphic techniques. In the interpretation process, the 3-D seismic data volume and well logs have been used. Based on well logs and synthetic traces two horizons were identified and picked which are the top and bottom of Zubair Formation. These horizons were followed over all the area in order to obtain structural setting as well as studying Kirkuk group Formation of Tertiary age which represents highstand progradational seismic facies.
This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreThirty-three samples of groundwater were taken from Dibdibba unconfined aquifer in the Zuber area southwestern parts of Basrah governorate south of Iraq to assess the groundwater quality. A statistical multivariate analysis was done using cations and anions, pH, total dissolved solids (TDS), and electrical conductivity (EC) that were measured for drinking, livestock, and construction purposes. Residual sodium bicarbonate (RSBC), Magnesium Ratio (MR), and Permeability index (PI) were used to evaluate the suitability of the present samples for irrigation activity. The quality of groundwater in the study area is unsuitable for drinking water, industrial and building uses. But it is suitable for livestock uses, According to Residual Sodium C
... Show MoreElectrical resistivity methods are one of the powerful methods for the detection and evaluation of shallower geophysical properties. This method was carried out at Hit area, western Iraq, in two stages; the first stage involved the use of 1Dimensional Vertical Electrical Sounding (VES) technique in three stations using Schlumberger array with maximum current electrodes of 50m. The second stage included the employment of two dimension (2D) resistivity imaging technique using dipole-dipole array with a-spacing of 4m and n-factor of 6 in two stations. The 1D survey showed good results in delineating contaminated and clear zones that have high resistivity contrast. Near the main contaminated spring, the 2D resi
... Show MoreThe resistivity survey was carried out by using vertical electrical sounding (VES) and 2D imaging techniques in the northern Badra area, Eastern Iraq. Eleven VES points distributed on two parallel profiles and six 2D imaging stations were applied using long survey lines.
In general, two types of aquifers are recognized in the study area. The first is the Quaternary aquifer, which appears in all geological sections and inverse model of 2D imaging stations (2DS).This aquifer can be divided into upper and lower aquifers as shown in (2DS1), (2DS3), and (2DS4). Generally, the thickness of this aquifer ranges between (30-200 m) which occurs at a depth of (10-30m) according to geological sections, while its thickness ranges between (35-180m)
Radon concentrations are measured for water samples collected from twenty wells which were drilled in Hashimiya area in addition to twelve samples of surface water using Alpha Gaurd. 140 samples, 7 for each well, were collected represent wet season in continuous pumping and 20 samples, one for each well, were collected represent dry season. Concentration of radon in groundwater is many times of its concentration in surface water. The minimum concentration in groundwater is about (7) Bq/L and (5) Bq/L while the maximum concentration is about (31) Bq/L and (19) Bq/L in wet season and dry season respectively. The range of radon concentrations in river water is between (1.06) Bq/L and (1.21) Bq/L. This study has indicated that there is a flo
... Show MoreCurrently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu