Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThis study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreAn encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s
... Show MoreABSTRACT: Polypyrrole and polypyrrole / silver nanocomposites were fabricated by in-situ polymerization employing Ammonium Persulphate as an oxidizing agent. Nanocomposites were synthesized by combining polypyrrole and silver nanoparticles in various weight percentages (0.1%, 0.5%, 3%, 5% and 7% wt.). Crystallographic data were collected using X-ray diffraction. PPy particles were found to have an orthorhombic symmetry. In contrast, PPy/Ag nanocomposites were reported to have monoclinic structure. The crystallite size was determined by XRD using Scherrer equation and considered to be within 49 nm range. DC conductivity of pelletized samples was evaluated in the temperature range of 323.15k to 453.15k. The conductivity displayed an
... Show MoreBuffering of Local anaesthesia (LA) has been suggested as a mechanism to improve injection comfort and hasten the onset of anaesthesia. Aim This study aimed to evaluate the effectiveness of buffered LA in the extraction of maxillary premolars and molars. Materials and Methods This randomized controlled study included 100 patients who were indicated for extraction of maxillary posterior teeth, they were randomly divided into two groups; a study group that received infiltration of buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA, and a control group that received non-buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA. The buffering was performed using the Onset® LA buffering system (Onpharma®). The outcome va
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreThe study explored applications of artificial intelligence and its dialectical relationship with international human rights law of individuals, which requires assessing the effects of this technology on human rights and freedoms. The problem of privacy of humanity, as AI technologies can control human rights and freedoms, while monitoring potential violations in this context. The study use of documentary research and qualitative lens to analyze the data. In conclusion, unawareness of the use of AI may impose significant hurdles on future generations and may infringe on human rights across all sectors of society. The government should mandate obligations for artificial intelligence businesses concerning education, health, human right
... Show MoreMalaysia's growing population and industrialisation have increased solid waste accumulation in landfills, leading to a rise in leachate production. Leachate, a highly contaminated liquid from landfills, poses environmental risks and affects water quality. Conventional leachate treatments are costly and time-consuming due to the need for additional chemicals. Therefore, the Electrocoagulation process could be used as an alternative method. Electrocoagulation is an electrochemical method of treating water by eliminating impurities by applying an electric current. In the present study, the optimisation of contaminant removal was investigated using Response Surface Methodology. Three parameters were considered for optimisation: the curr
... Show MoreIn our research, we seek to shed a light on one of the most important and sensitive issues, namely, the Sufi influence in the Iraqi novel through the lame maqam of the novelist Jumaa Al-Lami, the Sufi discourse contains many semantic paradoxes between the text's apparent pronunciation and its interpretation of the format and the context that produced these patterns, and incited them, which concludes different results from the prevailing provisions and fixed ideas from the narrative text.The Arabic and Iraqi novel in particular became inspired by the power of Sufi discourse by talking about several Sufi figures by referring to it openly, or implicitly inspired by unauthorized concealment, in employing some of the ideas, or summoning
... Show More