<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>
The settlement rate and pore water pressure dissipation rate are mainly controlled by the permeability of soil. Both laboratory and field tests show that the permeability is varied during the loading and consolidation process. It is known that consolidation process is accompanied by decrease in void ratio which leads to decrease in the coefficient of permeability. The importance of the decrease of the coefficient of permeability on the time rate of settlement and pore water pressure needs to be investigated.
This paper takes into account the change in coefficient of permeability during consolidation and studies its effect on consolidation characteristics of a clay layer. The finite element method is used in the analysis and the packag
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis manuscript investigated the effect of anchorage CFRP wrapping sheets, bolts, and laminate interlock on increasing the efficiency of flexural strengthening for the post-tension girder using CFRP composites techniques longitudinal laminates at the soffit for partially damaged loss of about 14.3% from its area of prestressed concrete beams, and the impact on restoring the original flexural capacity of PC girder. Mitigating delamination of the soffit of horizontal laminates (CFRP). The texture of the laminate and anchorages influenced the stress of the laminate carbon fiber, the mode of crack propagation and failure, and consequently, the beam's attitude has been investigated in this manuscript. The experimental findi
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreNisoldipine (NSD) is a dihydropyridine class of calcium channel blockers used for hypertension treatment, it belongs to class II BCS (low solubility with high permeability), its absolute bioavailability is only 5% due to presystemic metabolism in the gut wall. It is also a substrate for a CYP3A and P-gp. Bilosomes are lipid bilayer vesicles incorporating bile salts in their walls to prevent degredation by GIT bile salts. The aim of this study is to prepare nisoldipine bilosomes as vesicular carrier and assess the effect of different formulation variables such as type of surfactant, amount of cholesterol, surfactant and sonication time on particle size, entrapment efficiency and poly dispersity index of the prepared bilos
... Show More