In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis of ciphertext shows that the resulted cipher is robust. Each character in the plaintext has different representations in the ciphertext even if the characters are repeated through the message. The strength of generated cipher was measured through brute force attackers, they were unable to deduce the key from the knowledge about pairs of plaintext- ciphertext due to the fact that each occurrence of characters in the message will have different shift value, and as a result a diverse representation will be obtained for same characters of the message.
Reconstruction an object from its Fourier magnitude has taken a great deal in the literature and there is still no obvious solution for the failure of this algorithm. In this paper, the frequent failure of the phase retrieval is discussed in details and it has been shown that when the object is cento-symmetric, the object support is vital element to ensure uniqueness while for asymmetric object; the asymmetric support of the object is not enough to ensure uniqueness but the reconstruction appear to include most of the information of the original object. This is also true for the reconstruction of a complex function.
The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semanti
... Show MoreThe recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semantic accuracy a
... Show MoreThe current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multiple activities in the field of media and is far away from the effects imposed by the media institutions on employees with respect to the adoption of the institution policy, its agenda, and the trends financing it. The current research aims at identifying Mass Media Communications Misdirecting in Broadcasting Information made by media. The researcher headed for the Iraqi Center of Media Liberty, one of non-governmental civil society organizations, that this center has multipl
... Show MorePreparation of epoxy/ TiO2 and epoxy/ Al2O3 nanocomposites is studed and investigated in this paper. The nano composites are processed by different nano fillers concentrations (0, 0.01, 0.02 ,0.03, 0.04 ,0.05 ,0.07 and 0.1 wt%). The particles sized of TiO2,Al2O3 are about 20–50 nm.Epoxy resin and nano composites containing different shape nano fillers of (TiO2:Al2O3 composites),are shear mixing with ratio 1 to 1,with different nano hybrid fillers concentrations( 0.025 ,0.0 5 ,0.15 ,0.2, and 0.25 wt%) to Preparation of epoxy/ TiO2- Al2O3 hybrid composites. The mechanical properties of nanocomposites such as bending ,wearing, and fatigue are investigated as mechanical properties.
This study presents an investigation about the effect of fire flame on the punching shear strength of hybrid fiber reinforced concrete flat plates. The main considered parameters are the fiber type (steel or glass) and the burning steady-state temperatures (500 and 600°C). A total of 9 half-scale flat plate specimens of dimensions 1500mm×1500mm×100mm and 1.5% fiber volume fraction were cast and divided into 3 groups. Each group consisted of 3 specimens that were identical to those in the other groups. The specimens of the second and the third groups were subjected to fire flame influence for 1 hour and steady-state temperature of 500 and 600°C respectively. Regarding the cooling process, water sprinkling was applied directly aft
... Show MoreThe digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel