<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
Fundamentals Concept in Metorology an Introductory Survey - ISBNiraq.org
This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.
This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database. The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species. Information of specimens' collection for each species, synonyms and geographical distribution were provided.
The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti
... Show More