In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد
... Show MoreThis research is devoted to investigate relationship between both Ultrasonic Pulse Velocity and Rebound Number (Hammer Test) with cube compressive strength and also to study the effect of steel reinforcement on these relationships.
A study was carried out on 32 scale model reinforced concrete elements. Non destructive testing campaign (mainly ultrasonic and rebound hammer tests) made on the same elements. About 72 concrete cubes (15 X 15 X15) were taken from the concrete mixes to check the compressive strength.. Data analyzed.Include the possible correlations between non destructive testing (NDT) and compressive strength (DT) Statistical approach is used for this purpose. A new relationships obtained from correlations results is give
In this study, the use of non-thermal plasma theory to remove toxic gases emitted from a vehicle was experimentally investigated. A non-thermal plasma reactor was constructed in the form of a cylindrical tube made of Pyrex glass. Two stainless steel rods were placed inside the tube to generate electric discharge and plasma condition, by connecting with a high voltage power supply (up to 40 kV). The reactor was used to remove the contaminants of a 1.25-liter 4-cylinder engine at ambient conditions. Several tests have been carried out for a ranging speed from 750 to 4,500 rpm of the engine and varying voltages from 0 to 32 kV. The gases entering the reactor were examined by a gas analyzer and the gases concentration ratio
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThe purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.
In this paper, the Normality set will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of .
Linear attenuation coefficient of polymer composite for beta particles and bremsstrahlung ray were investigated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy range from 0.1-1.1 MeV. The present results show the capability of this composite to absorber beta particles and bremsstrahlung ray that yield from it. That’s mean it is useful to choice this composite for radiation shielding of beta ray with low thickness.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show More