The hero traditionally has such admirable traits as courage, fortitude,
chivalry and patriotism. In the literary works, the hero is the leading
character and the pivot around which all the characters and the events
revolve. The characteristics of the hero usually reflect the cultural values
of his time. Because, in each age, Man's attitudes towards himself and the
world change, different images of the hero emerge.
In Greek Mythology, the hero is frequently favoured by the gods;
therefore, he is himself semi-divine. The Greek hero is of princely birth
and is endowed with good physique, exceptional strength, skill in
athletics and battle, energy and eloquence, like Odysseus who is the hero
of the Odyssey, long epic poem traditionally ascribed to the Greek poet
Homer. Odysseus is the king of Ithaca and he is a valorous, mighty leader
who took part in the siege of Troy. On his way back to Ithaca, after the
end of the war, he passed through many dangerous adventures in which
he encountered ruthless monsters such as Cyclopes, a giant with one eye,
and Scylla, an equally dreadful monster with six head. 1
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreIn this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreMefenamic acid (MA) is one of the non-steroidal anti-inflammatory drugs, it is widely used probably due to having both anti-inflammatory and analgesic activity, the main side effects of mefenamic acid include gastrointestinal tract (GIT) disturbance mainly diarrhea, peptic ulceration, and gastric bleeding. The analgesic effects of NSAIDs are probably linked to COX-2 inhibition, while COX-1 inhibition is the major cause of this classic adverse effects. Introduction of thiazolidinone may lead to the increase in the bulkiness leads to the preferential inhibition of COX-2 rather than COX-1 enzyme. The study aimed to synthesize derivatives of mefenamic acid with more potency and to decrease the drug's potential side effects, new series of 4-t
... Show MoreNon-steroidal anti-inflammatory drugs (NSAIDs) contain free –COOH which thought to be responsible for the GI irritation associated with all traditional NSAIDs. The esterification of this group is one of an approach to ultimate aim for reduce the gastric irritation; so in this study we synthesized and preliminarily evaluated new ester compounds as new analogues with expected selectivity toward COX-2 enzyme. Synthetic procedures have been successfully developed for the generation of the target compounds (III a and b). The synthetic approach involved multi-steps procedures which include: Synthesis of 4-hydroxy benzene sulphonamide ( I b ), synthesis of Naproxen and Ibuprofen acyl chloride and then reacting them with 4-hydroxy benzene sulphon
... Show MoreAbstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreThis research aims to examine the relationship between learning organization and behavior of work teams. The variable of the learning organization took four dimensions depending on the study (sudhartna & Li, 2004): Common cultural values , communication, knowledge transfer and the characteristics of workers. The behavior of teams was identified on the basis of realizing of the respondents of their organization to work as a team where the research relied concepts applied in the study (Hakim , 2005) , and chose to research the case of a service organization for the study and relied on four dimensions of coordination , cooperation , sharing of information , the performance of the team, and was a curriculum approach and des
... Show More