The present study introduces description of a new species of class Ostracoda genus Hemicypris Sars, 1903. External morphological characters particularly shape, size and structure of left and right valves of carapace and body appendages were discussed and illustrated. Locality and date of collection were given.
Iron ore deposits have been identified from Nawgwezany Mishao in the Shalair Valley area within the Iraqi Zagros Suture Zone (IZSZ) at NE-Iraq. The iron ore is mainly hosted by the Shalair Metamorphic Rock Group calcschist. The transmitted and reflected light microscope study and X-ray diffraction of the calcschist revealed that the predominance minerals are calcite, and sillimanite, while muscovite, graphite, k-feldspar, and opaque mineral represent minor constituents. Meanwhile, skarn host rock as a second host rock shows the mineral assemblages of clinopyroxene, quartz, hornblende, epidote, plagioclase, sericite, garnet, and opaque minerals. The field and petrographical data indicated that the iron ore includes magnetite, hem
... Show MoreThe fauna of bees (Hymenoptera, Apoidea) from different regions of Iraq is surveyed in this study; there were 16 species, 13 genera that belong to four families which are collected in this investigation.
Also, all the species that are recorded for Iraq in previous investigations are revised; totally there are 110 species, 32 genera belonging to five families: Apidae, Andernidae, Colletidae, Halictidae and Megachilidae were listed.
In this paper all possible regressions procedure as well as stepwise regression procedure were applied to select the best regression equation that explain the effect of human capital represented by different levels of human cadres on the productivity of the processing industries sector in Iraq by employing the data of a time series consisting of 21 years period. The statistical program SPSS was used to perform the required calculations.
In this paper, a comparison of production and domestic consumption of Iraq's food industries within economic environment of a sample of countries is presented. Tracked by a number of variables, To extrapolate the reality of this industry in terms of its importance to individual consumption and importance on national economy, then, to find size and type of obstacles facing the industry in Iraq. Relationship was measured through use of quantitative methods and digital data in the comparison process. Results showed that the large growth in the size of the population in Iraq is not the first multiplier in the high consumption of processed food, but the increase in the per-capita income. The treatment takes several aspects related to the gene
... Show MoreThis paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More