The research aim was to observe the distribution pattern of
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreExperiments were carried out at the College of Veterinary Medicine, University of Baghdad, during the period from October 26th 2023 to December 20th 2023, to study the effect of pasteurizing treatments of shell table egg using traditional Microwave oven on its quality characteristics during Zero, 1, 2, 4 and 8 weeks of refrigerator storage. A total of 120 fresh table eggs (White shell eggs) were collected from 20000 Luhman layer hens flock at Al-Amir project commercial farm, Al-Musaib city. These eggs were divided into 4 treatment of microwave pasteurization treatments which were Zero, 10, 20, and 30 sec. Results revealed that the numbers of total bacteria and total coliform on the surface of table egg shells is affected by pasteuri
... Show MoreAn experiments were carried out at the College of Veterinary Medicine, University of Baghdad, during the period from October 26th 2023 to December 20th 2023, to study the effect of pasteurizing treatments of shell table egg using traditional Microwave oven on its quality characteristics during Zero, 1, 2, 4 and 8 weeks of refrigerator storage. A total of 120 fresh table eggs (White shell eggs) were collected from 20000 Luhman layer hens flock at Al-Amir project commercial farm, Al-Musaib city. These eggs were divided into 4 treatment of microwave pasteurization treatments which were Zero, 10, 20, and 30 sec. Results revealed that significant differences (P<0.05) for the internal characteristics of the egg after storage for 2, 4
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreGrabisch and Labreuche have recently proposed a generalization of capacities, called the bi-capacities. Recently, a new approach for studying bi-capacities through introducing a notion of ternary-element sets proposed by the author. In this paper, we propose many results such as bipolar Mobius transform, importance index, and interaction index of bi-capacities based on our approach.
In low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is
... Show More