Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
Phenol is one of the worst-damaging organic pollutants, and it produces a variety of very poisonous organic intermediates, thus it is important to find efficient ways to eliminate it. One of the promising techniques is sonoelectrochemical processing. However, the type of electrodes, removal efficiency, and process cost are the biggest challenges. The main goal of the present study is to investigate the removal of phenol by a sonoelectrochemical process with different anodes, such as graphite, stainless steel, and titanium. The best anode performance was optimized by using the Taguchi approach with an L16 orthogonal array. the degradation of phenol sonoelectrochemically was investigated with three process parameters: current de
... Show MoreAn update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .
Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking |
The icon and the symbol represent the constituents of the communication process, through their intellectual and philosophical concepts that have been addressed by the current research that it has touched upon their importance in conveying the design idea for the recipient and showing the specificity of each one of them in the communication process. The research problem has been limited by the following question: what are the communication roles that the symbol and the icon present for the user in designing the industrial product?
The research objective is to reveal the theoretical visualization that describes the icon and the symbol in the industrial product and its importance in the communication process through stating the of simil
A new, simple, sensitive and fast developed method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation a burgundy color complex between methyldopa andammonium ceric (IV) nitrate in aqueous medium using long distance chasing photometer NAG-ADF-300-2. The linear range for calibration graph was 0.05-8.3 mmol/L for cell A and 0.1-8.5 mmol/L for cell B, and LOD 952.8000 ng /200 µL for cell A and 3.3348 µg /200 µL for cell B respectively with correlation coefficient (r) 0.9994 for cell A and 0.9991 for cell B, RSD % was lower than 1 % for n=8. The results were compared with classical method UV-Spectrophotometric at λ max=280 n
... Show MoreThis work presents a completely new develop an analyzer, named NAG-5SX1-1D-SSP, that is simple, accurate, reproducible, and affordable for the determination of cefotaxime sodium (CFS) in both pure and pharmaceutical drugs. The analyzer was designed according to flow injection analysis, and conducted to turbidimetric measurements. Ammonium cerium nitrate was utilized as a precipitating agent. After optimizing the conditions, the analysis system exhibited a linear range of 0.008-27 mmol. L-1 (n=29), with a limit of detection of 439.3 ng/sample, a limit of quantification of 0.4805 mg/sample, and a correlation coefficient of 0.9988. The repeatability of the responses was assessed by performing six successive injections of CFS at concentra
... Show More