This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
Aphid Aphis spp (Hemiptera:Aphididae) and Thrips Thrips spp (Thysanoptera: Thripidae) an economically important pests on several crops in the world and Iraq, that transfer many viruses diseases to it. Field studies were conducted to assessment the population density of these insects and susceptibility of six varieties (Barin, Revera, Divela, Rudlph, Alazata and Pleny) to infestation during 2013 spring season. The results were showed that all Potato varieties were infested by Aphis and Thrips on spring plantation but with different percentage. The Divela variety was higher percentage of infestation and high population density of aphid which averaged 1.47 insect/ leaf while in Alazata was the lower population density which averaged 1.02 in
... Show MoreChitinase-3-like 1 protein (YKL-40) is a glycoprotein primarily produced in the arthritic joint and plays a crucial role in inflammatory processes. The aim of the study is to establish the role of YKL-40 as a biomarker for rheumatoid arthritis (RA) compared to proinflammatory biomarkers and disease activity. The study included 58 patients and 18 control. Diseases activity score (DAS-28) and clinical disease activity index (CDAI) were measured. Serum level of YKL-40, tumor necrosis factor-α (TNF-α), interleukin-1B (IL-1β), erythrocyte sedimentation (ESR), rheumatoid factor (RF), C-reactive protein (CRP), and anti-citrullinated protein antibody (ACPA) were assessed. The results showed that the median serum YKL-40 level which was 5.42
... Show MoreMercury, arsenic, cadmium and lead, were measured in sediment samples of river and marine environmental of Basra governorate in southern of Iraq. Sixteen sites of sediment were selected and distributed along Shatt Al-Arab River and the Iraqi marine environment. The samples were distributed among one station on Euphrates River before its confluence with Tigris River and Shatt Al-Arab formation, seven stations along Shatt Al-Arab River and eight stations were selected from the Iraqi marine region. All samples were collected from surface sediment in low tide time. ICP technique was used for the determination of mercury and arsenic for all samples, while cadmium and lead were measured for the same samples by using Atomic Absorption Spectrosc
... Show MoreIn this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and by studying molecular docking using Autodock (4.2.6) software.
The study examines Julia Alvarez's role as a Dominican American author, poet, and essayist. Despite being born in New York City in 1950, she was raised in the Dominican Republic by a family with Dominican heritage. Her residence in her ancestral homeland significantly influenced her subsequent literary works. Upon her father's implication in a conspiracy against Dominican President, he departed from the Dominican Republic. Alvarez encountered the challenge of the English language. They were compelled to acquire proficiency in English due to the prevailing perception that anyone who spoke a language other than English were deemed "un-American" during that period. Alvarez recounted her initial encounters in the United States and the subseque
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show More