This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will become relevant toward implementing image encryption system. This helps them select the best chaotic map for image encryption to ensure secure digital data. © 2024 Little Lion Scientific. All rights reserved.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show Moreيهدف هذا البحث الى التطرق الى صورة العربي كما يعرضها ادب اليافعين العبري في رواية " نادية " للكاتبة العبرية " كاليلا رون فيدر " . والتي تعد من الاديبات العبريات اللواتي تطرقن بصورة مباشرة الى موضوع ما خلف الجدار ، والصراع العربي – الإسرائيلي وانعكاساته على المجتمع الإسرائيلي بصورة عامة والمجتمع العربي بصورة خاصة . ينقسم هذا البحث إلى ثلاثة فصول، تطرق الفصل الأول إلى "ادب اليافعين"، و تاريخه ، مميزاته والفئ
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreTrimmed Linear moments (TL-moments) are natural generalization of L-moments that do not require the mean of the underlying distribution to exist. It is known that the sample TL-moments is unbiased estimators to corresponding population TL-moment. Since different choices for the amount of trimming give different values of the estimators it is important to choose the estimator that has minimum mean squares error than others. Therefore, we derive an optimal choice for the amount of trimming from known distributions based on the minimum errors between the estimators. Moreover, we study simulation-based approach to choose an optimal amount of trimming and maximum like hood method by computing the estimators and mean squares error for range of
... Show MoreLet R be a prime ring and δ a right (σ,τ)-derivation on R. In the present paper we will prove the following results:
First, suppose that R is a prime ring and I a non-zero ideal of R if δ acts as a homomorphism on I then δ=0 on R, and if δ acts an anti- homomorphism on I then either δ=0 on R or R is commutative.
Second, suppose that R is 2-torsion-free prime ring and J a non-zero Jordan ideal and a subring of R, if δ acts as a homomorphism on J then δ=0 on J, and if δ acts an anti- homomorphism on J then either δ=0 on J or J
Z(R).
This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro
... Show MoreThis paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
Let be a metric space and be a continuous map. The notion of the -average shadowing property ( ASP ) for a continuous map on –space is introduced and the relation between the ASP and average shadowing property(ASP)is investigated. We show that if has ASP, then has ASP for every . We prove that if a map be pseudo-equivariant with dense set of periodic points and has the ASP, then is weakly mixing. We also show that if is a expansive pseudo-equivariant homeomorphism that has the ASP and is topologically mixing, then has a -specification. We obtained that the identity map on has the ASP if and only if th
... Show More