The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brute-force attacks, due to its big key space size and sensitivity to initial values. This algorithm be responsible for a forceful and flexible solution for acquiring secure images, appropriate for high resolution data and real time applications.
With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreThis study exposed to use the liquid whey (which was produced from of soft cheese processed) partially or completely instead of milk in fatty cake, this whey residue is still not used, instead it is thrown in rivers which effect different environment and economic problems. Different concentrations was used (25% , 50% , 75% , and 100%) of whey in baked cake , Volume , height and other different properties ( panel taste ) was studied too . Sensory evaluation results showed that an improved in all the character of the baked cake was happen by the used of 25% and 50% of the whey in comparison with the control treatment, the 75% replacement showed a decrease in appearance , texture and tenderness , while the degrees of color and fla
... Show MoreA high Tc superconductor with a nominal composition
(Bi1-xPbx)2(Sr1-yBay)2Ca2Cu3O10+δ for (0 £ x £ 0.5) and (0 £ y £ 0.5) was prepared by
a solid state reaction method. The effect of the substitution of Pb for Bi and Ba for Sr and
quenching temperature on the superconductivity has been investigated to obtain the
optimum conditions for the formation and stabilization of the high Tc phase (2223).
The results showed that the optimum sintering temperature for the pure composition is
equal to 875°C and the sintering time is equal to 240h with heating and cooling rate of
60°C/h . Our results indicated that a small amount of (Ba = 0.1) could raise the transition
temperature (Tc), but enhancing Ba to 0.4 has raised
In this paper, a new third kind Chebyshev wavelets operational matrix of derivative is presented, then the operational matrix of derivative is applied for solving optimal control problems using, third kind Chebyshev wavelets expansions. The proposed method consists of reducing the linear system of optimal control problem into a system of algebraic equations, by expanding the state variables, as a series in terms of third kind Chebyshev wavelets with unknown coefficients. Example to illustrate the effectiveness of the method has been presented.
Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More