Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe aim of this research is to study the influence of additives on the properties of soap greases, such as lithium, calcium, sodium, lithium-calcium grease, by adding varies additives, such as graphite, molybdenum disulfide, carbon black, corrosion inhibitor, and extreme pressure.
These additives have been added to grease to obtain the best percentages that improve the properties of grease such as load carrying, wear resistance, corrosion resistance, drop point, and penetration.
The results showed the best weight percentages to all types of grease which give good properties are 1.5% extreme pressure additive, 3% graphite, 1% molybdenum disulfide, 2.5% carbon black.
The other hand, the best weight percentage for corrosion inhibit
The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed. The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t
... Show MoreA calamitic symmetric liquid crystalline consisting of an azo group containing 5H-Thiazolo[3,4-b][1,3,4]thiadiazole moiety compound[III] was synthesized via sequence reactions starting from reaction terephthaldehyde with mercaptoacetic acid and thiosemicarbazide in the presence of concentrated sulfuric acid to synthesized 5,5'-(1,4-phenylene)bis(5Hthiazolo[4,3-b][1,3,4]thiadiazol-2-amine)[I] then the azo compound [II] synthesized by coupling between diazonium salt of the compound [I] with phenol at (0-4) ̊C., after that the compound [III] was synthesized by the reaction of the compound [II] with methyl bromide in alkaline media. The compounds are characterized by melting points, FTIR and 1HNMR spectroscopy. The mesomorphic behavior was stu
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show MoreRap songs often feature artists who utilize explicit language to convey feelings such as happiness, sorrow, and anger, reflecting audience expectations and trends within the music industry. This study intends to conduct a socio-pragmatic analysis of explicit, derogatory, and offensive language in the songs of the American artist Doja Cat, employing Hughes’ (1996) Swearing Word Theory, Jay’s (1996) Taboo Words Theory, Luhr’s (2002) classification of social factors for sociolinguistic examination, Salager’s (1997) categories of hedges for pragmatic assessment, and Austin’s (1965, 1989) theory of speech acts. The researchers collected the data using the AntConc corpus analysis tool. The data shows the singer’s frequent use
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More