Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreAn electrochemical sensor based on manganese dioxide nanorodMnO2and Graphene oxide (GO) functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (FGO)/MnO2Nanocompositewas developed for voltammetric determination of Tetracycline (TET).The working electrode WE of SPCE was modified bya drop casting method. X-ray powder diffractometer (XRD), scanning electron microscopy (SEM) and FT-IR were employed to characterize the synthesized FGO/MnO2. The determination of TET at the modified electrode was studied by cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in the phosphate buffer solution (PBS).TET show sharp increase in the oxidation peaks in the pH 2.Voltammetric characteristics of TET (Epa, Ipa) were estimate
... Show MoreRoof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the
... Show MoreThis study investigates the influence of five nanomaterials nano-alumina (NA), nano-silica (NS), nano-titanium (NT), nano-zinc oxide (NZ), and carbon nanotubes (CNT)on enhancing the fatigue resistance of asphalt binders. NA, NS, and NT were incorporated at dosages of 2%, 4%, 6%, 8%, and 10%, while NZ and CNT were added at 1%, 2%, 3%, 4%, and 5%. A series of physical, rheological, and performance-based tests were conducted, including penetration, softening point, ductility, and rotational viscosity. Based on the outcomes of the overall desirability evaluation, the first three dosages of each nanomaterial were selected for further testing due to their superior workability and binder flexibility. Subsequent investigations included the high-tem
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show More