Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using six S-Boxes, as in the traditional method. Moreover, the CAST encryption algorithm was modified to be used on the private keys and substitution stage (S-Boxes), with the keys and S-Boxes of the encryption algorithm being generated according to the 2D and 3D chaotic map functions. The proposed system passed all evaluation criteria, including (MSE, PSNR, EQ, MD, SC, NC, AD, SNR, SIM, MAE, Time, CC, Entropy, and histograms). Results: Moreover, the results also illustrate that the created S-Boxes passed all evaluation criteria; compared with the results of the traditional method that was used in creating S-Box, the proposed method achieved better results than other methods used in the other works. The proposed solution improves the entropy which is between (7.991–7.999), reduces the processing time which is between (0.5–11 s/Images), and improves NCPR, which is between (0.991–1). Conclusions: The proposed solution focuses on reducing the total processing time for encryption and decryption and improving transmission security. Finally, this solution provides a fast security system for surgical telepresence with secure real-time communication. The complexity of this work needs to know the S-Box creation method used, the chaotic method, the values of the chaotic parameters, and which of these methods was used in the encryption process.
This work aims to investigate the tensile and compression strengths of heat- cured acrylic resin denture base material by adding styrene-butadiene (S- B) to polymethyl methacrylate (PMMA). The most well- known issue in prosthodontic practice is fracture of a denture base. All samples were a blend of (90%, 80%) PMMA and (10%, 20%) S- B powder melted in Oxolane (Tetra hydro furan). These samples were chopped down into specimens of dimensions 100x10x2.5mm to carry out the requirements of tensile tests. The compression strength test specimens were shaped into a cylinder with dimensions of 12.7mm in diameter and 20mm in length. The experimental results show a significant increase in both tensile and compression strengths when compared to cont
... Show MoreThis paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreThe increasing demand for energy has encouraged the development of renewable resources and environmentally benign fuel such as biodiesel. In this study, ethyl fatty esters (EFEs), a major component of biodiesel fuel, were synthesized from soybean oil using sodium ethoxide as a catalyst. By-products were glycerol and difatty acyl urea (DFAU), which has biological characteristics, as antibiotics and antifungal medications. Both EFEs and DFAU have been characterized using Fourier transform infrared (FTIR) spectroscopy, and 1H nuclear magnetic resonance (NMR) technique. The optimum conditions were studied as a function of reaction time, reactant molar ratios, catalyst percentage and the effect of organic solvents. The conversion ratio of soybea
... Show MoreThe reaction of ethylenediamine with [2,4,6-trihydroxyacetophenon] and KOH (Schiff Base) to gives the new tetradentate ligand 2-(1-{2-{1-2,6-Dihydroxy-4-methyl phenyl)ethyliden amino}- ethylimino}-ethyl-benzene- 1,2,5-triol [HCl]. This ligand was reacted with some metal ions (Cu(II), Co(II), Ni(II), Zn(II), and Cd(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(H4L)], where: M= Cu(11), Co(II), Ni(II), Zn(II), and Cd(II). All compounds were characterized by spectroscopic methods [I.R, U.V.-Vis, C.H.N., analysis H.P.L.C, atomic absorption, magnetic susceptibility, (EI-mass for the ligand)], and microanalysis along with conductivity measurements
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract. This work presents a detailed design of a three-jointed tendon-driven robot finger with a cam/pulleys transmission and joint Variable Stiffness Actuator (VSA). The finger motion configuration is obtained by deriving the cam/pulleys transmission profile as a mathematical solution that is then implemented to achieve contact force isotropy on the phalanges. A VSA is proposed, in which three VSAs are designed to act as a muscle in joint space to provide firm grasping. As a mechatronic approach, a suitable type and number of force sensors and actuators are designed to sense the touch, actuate the finger, and tune the VSAs. The torque of the VSAs is controlled utilizing a designed Multi Input Multi Output (MIMO) fuzzy controll
... Show MoreResearch,s Summary The purpose of the research was to specify the standerd Levels for results of basketball for Iraqi young sters, Becuse there werenot the standerd Levels which related to the testings abilities of the players based on plying centers specially the physical abilities, This made weakness in arrangement and putting the suitable training studies for different age stadges which suitable with game ,s requirements, besides evaluation the performance of the plyers in common and the levels of the coachs train in special according to the scientific style. The researchers depended on (8) special testings of chossen physical abilities, These testings applied on the teams, young players for sharing clubs among excellent series of basket
... Show More