Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Goal of research is to investigate the impact of the use of effective learning model in the collection of the fourth grade students/Department of physics in the material educational methods and the development of critical thinking .to teach this goal has been formulated hypothesis cefereeten zero subsidiary of the second hypothesis .To investigate the research hypothesis were selected sample of fourth-grade students of the department of physics at the univers
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreThis study measures the indicators of social and environmental performance of the contents of the administration's prepared reports on its social and environmental performance by comparing the actual performance with the indicators set within the standards of the Global Reports Initiative (GRI), In preparing this research, the researchers relied on studying the criteria of the Global Reporting Initiative, which aims to achieve a high level of performance disclosure under sustainability, In light of contemporary global trends towards achieving sustainable development and its disclosure and the orientations of economic institutions and units in different countries towards emphasizing the extent of commitment during practicing its a
... Show MoreThis study attempts to address the importance of communicative digitization in the field of various arts for the sake of continuity of shopping and aesthetic, artistic and intellectual appreciation of artistic achievements by the recipient on various places of their residence in light of the COVID 19 crisis, and to highlight the importance of the plastic arts of the Iraqi painter exclusively and how it expresses in a contemporary way the environment or life reality in Iraq in light of this crisis. With all its implications affecting the life reality from various aspects and methods of its negative and positive employment. As for the research procedures, the researcher reviewed the research methodology represented by the descriptive ana
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreObjectives: Successful endodontic treatment outcome requires effective shaping and cleaning of root canals. This study aims to evaluate the smear layer removal after continuous chelation (CC) ) NaOCL\HEDP( and sequential chelation (SC) )NaOCL\EDTA( and their influence on the push-out bond strength (POBS) of Bio-C sealer. Materials and Methods: Palatal roots of the maxillary first molar (n=72) were divided into four groups (n=18) as follows: 3% NaOCL, SC: 3% NaOCL followed by 17% EDTA, CC: 3% NaOCL \9% HEDP and Distilled water. Thirty-two roots (n=8/group) were split longitudinally for smear layer evaluation using SEM. Forty roots were obturated with Guttapercha and Bio-C sealer using a single cone technique. Thre
... Show MoreConsider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More