Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreThe electrospun nanofibers membranes have gained considerable interest in water filtration applications. In this work, the fabrication and characterization of the electrospun polyacrylonitrile-based nonwoven nanofibers membrane are reported. Then, the membrane's performance and antifouling properties were evaluated in removing emulsified oil using a cross flow filtration system. The membranes were fabricated with different polyacrylonitrile (PAN) concentrations (8, 11, and 14 wt. %) in N, N-Dimethylformamide (DMF) solvent resulted in various average fiber sizes, porosity, contact angle, permeability, oil rejection, and antifouling properties. Analyses of surface morphology of the fabricated membranes before and after oil removal revealed
... Show MoreIn this work, the extraction of glycyrrhizin from Licorice using bulk liquid membrane technique was developed and optimized. The effect of various parameters such as pH of stripping and donor solutions, temperature, stirring speed and kinetic parameters were investigated. Moreover, to study the impact of the polarity of membrane solvent, two types of extraction solvents were used as a membrane solvent: n-Hexane was used as a non-polar solvent and 1-Hexanol was as a polar solvent. The optimum extraction condition was found (95.53%) using 1-Hexanol, rotating speed was 400 rpm, and pH of the acceptor and donor solutions were 8 and 5.5, respectively. The reaction kinetics constants ( and ) for the transport of glycyrrhizin from the donor pha
... Show MoreDirect contact membrane distillation is an effective method for production of fresh water from saline water. In this study two samples were used as feed solutions; the first one was RO waste from Al-Hilla Coca-Cola Factory (TDS= 2382 mg/l) and the other was Haji Ali drainage water (TDS= 4127 mg/l). Polytetrafluoroethylene (PTFE) hydrophobic membrane supported with polypropylene (PP) was used as flat sheet form with plate and frame cell. Results proved that membrane distillation is an effective technique to produce fresh water with high quality from brine with low salinity content. With membrane area of 8x8 cm2, the volume of treated water decreased from 34.97 ml at first half hour to 33.02 ml after 180 min of
... Show MoreThis work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages,(10 rpm) discs speed of stainless steel discs,(pH= 9.5) of feed solution and (pH= 2) of acceptor solution in n-decane. Assuming the existence
... Show MoreThis work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages, (10 rpm) discs speed of stainless steel discs, (pH=9.5) of feed solution and (pH=2) of acceptor solution in n-decane. Assuming the existen
... Show MoreBox-Wilson experimental design method was employed to optimized lead ions removal efficiency by bulk liquid membrane (BLM) method. The optimization procedure was primarily based on four impartial relevant parameters: pH of feed phase (4-6), pH of stripping phase (9-11), carrier concentration TBP (5-10) %, and initial metal concentration (60-120 ppm). maximum recovery efficiency of lead ions is 83.852% was virtually done following thirty one-of-a-kind experimental runs, as exact through 24-Central Composite Design (CCD). The best values for the aforementioned four parameters, corresponding to the most restoration efficiency were: 5, 10, 7.5% (v/v), and 90 mg/l, respectively. The obtained experimental data had been
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.
That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian
... Show More