In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn this paper ,six new mixed metal ligand complexes are reported with Cephalexin (Ceph.H)as a primary ligand and Dimethylglyoxime (DMG) as secondary ligand with metal Chloride [MCl2 .nH2O. M=Mn(II),Co(II),Cu(II),Ni(II) and Zn(II),n=0-6] ,CrCl3.6H2O.The complexes are of (1:1:1)(Metal:Ligand: Ligand) Stoichiometry.The structures of these complexes are confirmed by using FT-IR and UV- electronic spectroscopies, magnetic moments, melting points, molar conductivity measurements and the metal % analysis revealed that the complexes analyze indicates a four coordinated as (A)=[M(HDMG) (Ceph)] .M=[Ni(II)and Zn(II).Six coordinated as (B) = K2[M(DMG)(CePh)(H2O)]. M= Mn (II),Co(II) and Cu(II) and (C)=[Cr(DMG)(Ceph)]Cl2. Interestingly, the in-vitro anti
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
A restrictive relative clause (RRC hereafter), which is also known as a defining relative clause, gives essential information about a noun that comes before it: without this clause the sentence wouldn’t make much sense. A RRC can be introduced by that, which, whose, who, or whom. Givon (1993, 1995), Fox (1987), Fox and Thompson (1990) state that a RCC is used for two main functions: grounding and description. When a RRC serves the function of linking the current referent to the preceding utterance in the discourse, it does a grounding function; and when the information coded in a RRC is associated with the prior proposition frame, the RRC does a proposition-linking grounding function. Furthermore, when a RRC is not used to ground a new di
... Show MoreTransparent nano- coating was prepared by Sol-Gel method from titanium dioxide TiO2 which has the ability to self-cleaning coating used for hospitals, laboratories, and places requiring permanent sterilization. Three primary colors are selected (red, blue, and yellow) as preliminary study to the effect of these colors on the nano-coating. Three traditional oil paints color were used as base, then coated by a layer of TiO2-Sol and deposited on the paints. The optical properties of TiO2-Sol were measured; the maximum absorption wavelength at (λmax=387 nm), the refractive index (n=1.4423) and the energy band gap (Eg=3.2 eV). The structure properties found by X-ray diffraction of TiO
The research aims to find out the effect of PEDODE Strategy on the acquisition of historical concepts of First Intermediate Grade. To achieve this goal, the researcher has put forward this zero hypothesis: There is no statistically significant difference at the level of (05,0) between the mean of the students' marks in the experimental group who study the history subject using PEDODE strategy and that of the students' marks in the control group who study the subject according to the traditional method in the post-testing on the acquisition of historical concepts. The sample of the study consists of (62 female-students) of First Intermediate Grade in the Directorate of Baghdad Education/ Karkh2nd for the academic year 2016-2017. The sampl
... Show More