Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
Our work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThis research Sought to identify the correlation relationships and the impact of each of the job description and perceived organizational support, Excellent Job performance of the heads of academic departments in the faculties of the University of Sulaymaniyah Iraqi Kurdistan Region, totaling (89) as President, and to achieve this was Default plan includes research variables as well as the formulation of a number of preparation fundamental assumptions, and researchers used a questionnaire for this purpose as a tool head of the collection of data and information, as it was distributed (80) copies, and the number of retrieved them (76) a copy of a valid statistical analysis, as well as conducting personal i
... Show MoreThe aim of this study was to increasing natural carotenoides production by a locally isolate Rodotorula mucilagenosa M. by determination of the optimal conditions for growth and production of this agents, for encouragest to use it in food application permute artificial pigments which harmfull for consumer health and envieronmental. The optimal condition of carotenoides production from Rhodotorula mucilaginosa M were studied. The results shows the best carbon and nitrogen source were glucose and yeast extract. The carotenoids a mount production was 47430 microgram ̸ litter and 47460 microgram ̸ litter, respectively, and the optimum temperature was 30°C, PH 6, that the carotenoides a mount was 47470 microgram ̸ litter and 47670 microgr
... Show MoreThe research deals with analyzing the influencing role of trade policies in the growth and development of productive economic sectors and their contribution to GDP and its reflection on workforce employment. Studies have proven the success of the Malaysian experience in stimulating the productive economic sectors to grow and their contribution to the gross domestic product with an increase in the growth of local markets and access to international markets for national products. The research also deals with the ineffectiveness of Iraqi trade policies after 2003 in stimulating the productive economic sectors (agricultural and industrial) on economic growth, as most of the increase in Iraqi GDP growth throughout the study period was
... Show MoreThe aim of this research is to develop qualitative workouts based on certain sensory perceptions for the development of offensive basketball abilities and to determine their impact on female pupils. Several findings, based on the au-thor's extensive expertise instructing basketball materials and our closeness to the sample, revealed deficits in some sensory perceptions “in the game of basketball”, which impair the accuracy of passing the ball to the best team-mate. It also affects the pace of dribbling and the difficulty of selecting the op-timal moment and distance to fire. Therefore, the researcher designs qualita-tive activities based on many sensory experiences, including distance, speed, force, and direction shift. In addition, the
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show More