Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
Objectives: The study aims at assessing the parental treatment and aggressive behaviors among adolescents and to find out the association between parental treatment and aggressive behavior.
Methodology: A descriptive correlational design that is initiated for the period of January 1st to July 5th, 2021; The sample of the study includes 220 from the intermediate school male students in schools in the Karkh and Rusafa in Baghdad have ranged in age from (13-15) years, the researcher used the convenient sampling method (non-probability sample) in which the students were selected purposively. Parental Treatment Scal
... Show MoreThe corona virus epidemic outbreak has urged an extreme worldwide effort for re‐purposing obtainable approved medications for its treatment. In this review, we're focusing on the chemicals properties andpharmacologicaleffectiveness of medicationsofsmallmolecule that are presently being evaluated in clinical trials for the management of corona virus (COVID‐19). The current review sheds light on a number of drugs that have been diagnosed to treat COVID‐19 and their biological effects.
The present study deals with the effect of teaching speaking Strategies (SS) on EFL Iraqi College students. The use of speaking strategies not only solves learners’ communication problems, but also enhances the learner’s interaction in target language, and improves their oral proficiency .The aim of the study is to find out the effect of teaching SS used by EFL College students .The learner of the first stage is population of the study at the Department of English, College of Education /Ibn-Rushd .The sample consists of (60) students distributed on experimental group(A) as well as control group(B) each group contains (30) students . In order to achieve the aim of the study, questionnaire has been constructed to be taught on the experime
... Show MoreIllegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the
... Show MoreProsopis farcta has been used traditionally for several diseases as cardiovascular, kidney, diabetes, bacterial infection and it has diuretic activity. This study was designed to evaluate the diuretic effects of P. farcta extract in comparison with spironolactone and hydrochlorothiazide in normal and hypertensive rats.Forty eight rats, were divided into Two groups. The First group was consist of Twelve normotensive rats, to represent the control group and normal treated group receiving 50 mg/Kg of P. farcta extract; Six rats in each group.
The Second group involved 36 hypertensive rats, were divided into six subgroups, each of six rats. The First subgroups served as a positive control, the Second, Third
... Show Moreobjective the research to diagnosis and interpretation of the nature of the correlation between the basic elements of knowledge management (tecgnology , structure , culture , process , human resource ) and the strategic performance of the Iraqi private banks, the research community and the level dimensions, and tested this research in the private banking sector represented by (7), especially in Baghdad city, Iraqi banks, and applied on sample consisting of 100 distributors in several administrative levels Director (Director, Director of the department, branch manager), and use questionnaire Head to collect data and information tool, and some private banks annual reports, has sought research to test a number of h
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreThis research shows the problem of the economic development of underdeveloped countries in an unconventional way, as these papers explain the problems of the economic development. This research not only reviews the problems, but it illustrates them in a philosophical way, basis of the data of modernity, this mean it is a process of connecting between the absence of the modernity values and the failure of development in underdeveloped countries. The Search follows the descriptive approach to get to the goal of search by four main axes. The first axis includes clarifying modernity and its principles, the second axis includes clarifying the economic development , the third axis includes the features of the mod
... Show MoreBackground: Chronic otitis media (COM) of mucosal or squamous type is a common problem in otolaryngology practice, the active form of COM is characterized by discharge of pus and is treated by antibiotics to start with, the appropriate antibiotic should be prescribed to avoid antibiotic abuse and guarantee good outcome. Objectives:The objective of this study is to identify the causative organisms of active chronic active otitis media both (mucosal, squamous) type and test their sensitivity to various anti- microbial agents &compare with abroad studies.Methods:A prospective study was done on eighty patients, different ages and sexes were taken and carful history and examination was done, examination under microscope was done with carf
... Show More