Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value
... Show MoreBackground: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randomly i
... Show MoreThe tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no dir
... Show MoreIn this research, Zinc oxide (ZnO)/epoxy nanocomposite was synthesized by simple casting method with 2wt. % ZnO concentration. The aim of this work was to study the effect of pH and composite dosage on the photocatalytic activity of ZnO/ epoxy nanocomposite. Scanning electron microscopy (SEM) technique images proof the homogeneous distribution of ZnO nanoparticles in epoxy. A synthesized nanocomposite samples were characterized by Fourier Transform Infrared spectrometer (FTIR) measurements. Two spectra for epoxy and 2wt.% ZnO/epoxy nanocomposites were similar and there are no new bonds formed from the incorporation of ZnO nanoparticles. Using HCl and NaOH were added to Methylene blue (MB) dye (5ppm) to gat pH values 3 and 8. The degradat
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreBackground: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randoml
... Show More