In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn order to advance the education process and raise the educational level of the players, it became necessary to introduce new educational aids, programmed education in the education process, through which the basic skills to be learned are explained and clarified, and immediate feedback is provided that would enhance the information of the learner, and Reaching the goal to be achieved, taking into account the individual differences between the players, and thus it is possible to move away from the educational methods used in learning skills, which requires great effort and time, in addition to that the open playground may not perform the skill accurately and the player looks from one side, while when using the computer you look from severa
... Show MoreThe Current research aims to identify ( the effect of Carin model in the achievement of the first intermediate Grade Students and their Reflective Thinking in physics Subject ) the researcher selected the experimental design with a partial adjust , The research sample consisted of ( 47 ) Students with ( 23 ) Students in the experimental group and ( 24 ) Students in the control group , The two groups rewarded in the variables chronological age in months , Reflective Thinking and the degrees in physics in the first course. The researcher coined the purposes of behavioral which belong to chapter fifth, sixth, and seventh of physics books scheduled of the school year ( 2015-2016 ) and prepared appropriate lesson plans for the two experimenta
... Show MoreAbstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre
Nutrient agar medium with various concentrations of cefotaxime was used for isolation spontaneous mutants from wild type strain of P.aeruginosa PHA-1. Eighty-two mutants were successfully isolated with the viable count 52×107 , these mutants were confirmed as spontaneous not physiological adaption mutants by reculture on the same medium. Then, wild type PHA-1 and mutants were examined for production pyocyanin; a blue greenish pigment was clearly noticed on King A medium. Remarkably the mutant strain named S300-8 was distinguished in productivity in comparison with wild type strain PHA-1; the amount of pigment was 56.0667mg/l and 74.53mg/l respectively. In addition, pyocyanin produced by mutant strain S300-8 revealed a potent efficacy again
... Show MoreThis research explains to us the role of the Islamic religion in the issue of accuracy in speech and work, and how it is closely related to human production in his life, and Islam affirms that his idea is mainly reflected in his production, and how it affects the perception of the meaning of creativity. Therefore, our Islam affirmed the accuracy in every word or work we do to build a society in which people enjoy high quality in ethics and dedication in their work so that the Islamic system depends on humanity to preserve our rights on the other hand the research discusses the deliberate default and how it reflects on our production and how it makes it less good.