Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
This research aims at studying and analyzing the creative research thinking of the educational staffs in private universities and colleges, and also the role of incentives, in its materialistic and moral sides in the development of such thinking and the pack of restraints which cause decline in interest level of the scientificresearch, and its weak role in the development of universities in Iraq, despite the interest of the Ministry of Higher Education and Scientific Research in Iraq in scientific research as part ofits academic and humanitarian targets.Based on study and analysis, and the using if some of statistical methods such as the Alpha Chronobaghcoefficient and the (T. Test)(F. Test),the research reached a number of conclusions.
... Show MoreAs long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show MoreA dynamic analysis method has been developed to investigate and characterize embedded delamination on the dynamic response of composite laminated structures. A nonlinear finite element model for geometrically large amplitude free vibration intact plate and delamination plate analysis is presented using higher order shear deformation theory where the nonlinearity was introduced in the Green-Lagrange sense. The governing equation of the vibrated plate were derived using the Variational approach. The effect of different orthotropicity ratio, boundary condition and delamination size on the non-dimenational fundamental frequency and frequency ratios of plate for different stacking sequences are studied. Finally th
... Show MoreThe permeability is the most important parameter that indicates how efficient the reservoir fluids flow through the rock pores to the wellbore. Well-log evaluation and core measurements techniques are typically used to estimate it. In this paper, the permeability has been predicted by using classical and Flow zone indicator methods. A comparison between the two methods shows the superiority of the FZI method correlations, these correlations can be used to estimate permeability in un-cored wells with a good approximation.
Islamic banks are distinguished by providing banking activities that are unique in providing them from the rest of the other types of banks, and these activities are a group of banking services provided by the bank to its customers, whether these banking activities are tangible or intangible. At the same time, it is a source of bank profits, as Islamic banks impose a percentage of Islamic Murabaha on those banking activities , However, these banks have developed new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) due to the economic conditions that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives, and a
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show More