In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreSignal denoising is directly related to sample estimation of received signals, either by estimating the equation parameters for the target reflections or the surrounding noise and clutter accompanying the data of interest. Radar signals recorded using analogue or digital devices are not immune to noise. Random or white noise with no coherency is mainly produced in the form of random electrons, and caused by heat, environment, and stray circuitry loses. These factors influence the output signal voltage, thus creating detectable noise. Differential Evolution (DE) is an effectual, competent, and robust optimisation method used to solve different problems in the engineering and scientific domains, such as in signal processing. This paper looks
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show More2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti
... Show MoreBackground: The main aim of the present study is to qualify and quantify voids formation of root canals obturated with GuttaCore (GC) and experimental Hydroxyapatite polyethylene (HA/PE) as new carrier-based root canal fillings by using micro computed tomography scan. Materials and methods: In the present study, eight straight single-rooted human permanent premolar teeth are selected and disinfected, then stored in distilled water. The teeth decoronated leaving a root length of 12mm each. The root canals instrumented by using crown down technique and the apical diameter of the root canal prepared to a size # 30/0.04 for achieving standardized measurements. A 5mL of 17% EDTA used to remove the smear layer followed by 5mL of 2.5% NaOCl and r
... Show More2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti
... Show MoreThis study investigated the healing effects of topical application of zerumbone, a well‐known anti‐inflammatory compounds loaded on nanostructured lipid carrier gel (Carbopol 940) (ZER‐NLCG) on excisional wounds in streptozotocin‐induced diabetic rats. Diabetic rats with inflicted superficial skin wound were topically treated with ZER‐NLCG, empty NLCG, and silver sulfadiazine cream (SSDC) once daily for 21 days. Wound tissue samples were analyzed for proinflammatory cytokines, namely, interleukin‐6 (IL‐6), interleukin‐1