This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
Through this article, we studied the peristaltic motion of “Hyperbolic Tangent” fluid in the geometry of curvature channel by using the analysis of large wavelength and less of Reynolds number. The matter has controlled mathematically by the partial differential equations of continuity, motion, heat transfer. In the study, we used the impact of radial magnetic force. The obtained coupled non-linear equations of above equations have solved by an approximation technical. Locked formula solutions of the stream function, axial velocity, heat function has evaluated. The influence of curvature is analysed and took it into account. The impact of sundry variables on the inflow features ha
Background: To evaluate the effect of antierosive agents (10% Nano-Hydroxyapatite (NHA), 10% Casein Phophopeptide-Amorphous Calcium Phosphate (CPP-ACP), and combination of 10% NHA and 10% CPP-ACP) on loss of minerals from enamel surface of permanent teeth treated with antierosive agents when exposed to an acidic beverage and investigate the morphological changes of treated enamel surface after demineralization with cola based beverage under Scanning Electron Microscope (SEM). Materials and Methods: Sixty maxillary first premolars were randomly divided into four groups, 15 teeth for each group. Group I treated with 10% NHA, Group II treated with 10% CPP-ACP, Group III treated with 10% NHA and 10% CPP-ACP, and Group IV did not treat with any
... Show MoreCoronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study pa
... Show Moreيهدف البحث إلى تقييم الكفاءة الوظيفية لمؤسسات التعليم الأهلي في أداء وظيفتها بمستوى عالٍ لتشبع حاجة سكان المدينة الذين فضّلوا التعليم الأهلي على التعليم داخل المؤسسات الحكومية مما أدى إلى انتشارها، وصولا إلى أهم الآثار المترتبة على ذلك الانتشار إذ نافست فيه مؤسسات التعليم الحكومي، بل وتنافست المؤسسات الأهلية فيما بينها لتقديم أفضل خدمة تعليمية للصراع من أجل البقاء، وتهدف أيضا إلى إظهار الوجه السلبي ا
... Show MorePraise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in whic
Abstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreThe expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.