Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
Sorghum cultivation is often accompanied by low field emergence rates and weak seedlings, which may be due to genetic or environmental stress. A factorial experiment was conducted in the spring and fall seasons of 2022 using a randomized complete block design with split-plot arrangement and four replications. Planting dates (spring season: Feb. 15th, Mar. 1st, 15th, and Apr. 1st, 15th; fall season: Jun. 15th, Jul. 1st, 15th, and Aug. 1st, 15th) were allocated to the main plots. Seeds stimulation treatments (35% banana peel extract + 100 mg L-1 citric acid and distilled water soaking treatment only) were allocated to the subplots. The interaction treatment (banana peel extract + citric acid) with the planting date of April 15 showed the high
... Show MoreEmpirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F
... Show Moreملخص البحث: تعتبر مشكلة تعاطي المخدرات من المشكلات التي تؤثر في بناء المجتمع وأفراده لما يترتب عليها من آثار اجتماعية واقتصادية ونفسية سيئة تنسحب على الفرد و على المجتمع، كما أنها ظاهرة اجتماعية مرضية تدفع إليها عوامل عديدة؛ بعضها يتعلق بالفرد والبعض الآخر بالأسرة والثالث بالبناء الاجتماعي ككل. وتعد ظاهرة انتشار المخدرات من الظواهر الأكثر تعقيدا وبارزة هذه الظاهر ة وإحدى مشكلات العصر، الشاملة في المجتمع، و
... Show MoreThe research(the internal and external factors affecting the political system in
PAKISTAN) involves a series of effects interact both internally and external to affect the
stsbility of the political system.
Intrernally there are a lot of powers affecting the political map of PAKISTAN such as
military institution, political parties, judgement, religious schools……etc.of internal
factors, which represent one of the most important pressure points on the system.
Externally one of the most important external factors which affect internal stability is
Pakistani allision to USA in antiterrorism war. The Pakistani military institution was
involved in the war against Pakistani tribes leading to unstable security in Paki
representing the media and communication problems and phenomena fertile material and of great importance in the media research, especially as they relate to various aspects of life and its impact on the culture of the community and on individuals and public opinion about the behavior of the various issues. The media incitement to violence and hatred of the most prominent media phenomena that increased the danger and expanded not at the local level, but also in the world. So we found it is important to study this problem from the standpoint of academic and professional. And according to the progress of this research is trying to answer a number of questions including:
A. What are the Iraqi Satellite TV channels most watched and follow
The origin of occupations and trades producing goods and services necessary for the members of society
When people are designated to perform this task, in which case the state of change is included in the imposition of adequate labor rights, and may change from imposing sufficient to imposing the eye
Does the state have the right to compel "tradesmen and professions" to do their jobs?
Therefore, this research came to address the legitimacy of this from the perspective of the Islamic economy.
t
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MoreThe study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators