Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreA stochastic process {Xk, k = 1, 2, ...} is a doubly geometric stochastic process if there exists the ratio (a > 0) and the positive function (h(k) > 0), so that {α 1 h-k }; k ak X k = 1, 2, ... is a generalization of a geometric stochastic process. This process is stochastically monotone and can be used to model a point process with multiple trends. In this paper, we use nonparametric methods to investigate statistical inference for doubly geometric stochastic processes. A graphical technique for determining whether a process is in agreement with a doubly geometric stochastic process is proposed. Further, we can estimate the parameters a, b, μ and σ2 of the doubly geometric stochastic process by using the least squares estimate for Xk a
... Show MoreShot boundary detection is the process of segmenting a video into basic units known as shots by discovering transition frames between shots. Researches have been conducted to accurately detect the shot boundaries. However, the acceleration of the shot detection process with higher accuracy needs improvement. A new method was introduced in this paper to find out the boundaries of abrupt shots in the video with high accuracy and lower computational cost. The proposed method consists of two stages. First, projection features were used to distinguish non boundary transitions and candidate transitions that may contain abrupt boundary. Only candidate transitions were conserved for next stage. Thus, the speed of shot detection was improved by r
... Show MorePulsed liquid laser ablation is considered a green method for the synthesis of nanostructures because there are no byproducts formed after the ablation. In this paper, a fiber laser of wavelength 1.064 µm, peak power of 1 mJ, pulse duration of 120 ns, and repetition rate of 20 kHz, was used to produce carbon nanostructures including carbon nanospheres and carbon nanorods from the ablation of asphalt in ethanol at ablation speeds of (100, 75, 50, 10 mm/s). The morphology, composition and optical properties of the synthesized samples were studied experimentally using FESEM, HRTEM, EDS, and UV-vis spectrophotometer. Results showed that the band gap energy decreased with decreasing the ablation speed (increasing the ablation time), the mi
... Show MoreYtterbium-doped (Y2O3), (Sc2O3) and (YAG) crystals are very important for high-power thindisk lasers. These lasers have shown their ability to operate quasi-three-level materials with high
efficiency as well as high thermal conductivity ratio for crystalline hosts. All these reasons have
required studying this type of laser. In the present work, the analytical solution was found for the
equation of laser output power, pumping threshold power, and efficiency of a quasi-three-level
thin disk laser. The numerical solution of these equations was also found through the Matlab
program at the fundamental transverse mode, at a temperature of 299K0
and with high pumping
capabilities in order to know the e
In this study, the effect of Nd: YAG laser on the activity of superoxide dismutase (SOD) and alcoholdehydrogenase (ADH) was investigated. The Saccharomyces cells were irradiated using 532nm Q-Switched Nd: YAG laser with (1Hz) frequency. Different fluences 11.3, 22.6 and 33.9mJ/cm2 and different number of pulses 15, 30 and 60 pulse were used. The irradiated cells were incubated in a liquid nutritive medium for 24 hours. After incubation, the cells were harvested and disrupted to extract the intracellular enzymes and their activities were assessed. In comparison with the control, the irradiated cells showed a significant increase in the activity and the specific activity of SOD at energy densities of 11.3 and 22.6mJ/cm2 at 30 and 60 pulses
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show More