In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.
The aim of the current research is to study a topic from the Qur’anic topics, few have researched it and realized its content, so people knew it in one name in the Qur’an in another name, and due to the ancientity of the topic and its contemporaneity, I wanted to write about it. The research has an introduction, three demands, and a conclusion with the most important results of the research:
As for the introduction: It was to indicate the importance of the topic and an optional reason for it.
As for the first requirement: it included the definition of reasoning, its divisions, and its characteristics.
As for the second requirement, it was to indicate the meaning, types, and methods of labeling it.
As for the third require
The precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show MoreTo evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreThe bubbled slab, a type of reinforced concrete (RC) slab with plastic voids, is an innovative design that employs a biaxial distribution of voiding formers within the slab to reduce the slab’s self-weight while preserving a load-carrying capacity that is approximately comparable to that of solid slabs. This paper presents a new approach for figuring out the effective critical shear perimeter of voided slabs using the reduced-volume concept of concrete. This approach aims to reduce the coefficient of variation of the current design standards, namely the ACI 318-19 and Eurocode 2, for assessing the slabs’ resistance to punching shear. Our experimental program investigated the impact of voiding former patterns and the location of
... Show MoreThis research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th