The Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is composed of various operations; firstly, the Exclusive OR and Circular Shift are performed on the message to enhance the diffusion property and that lead increasing the strength against cryptanalysis attack. Secondly, both parties agree on domain parameters for creating the elliptic curve and the mechanism to build the lookup table for encoding/decoding process. Thirdly, the base point is selected for generating all (x, y) pair points of the elliptic curve and extract – coordinate values
to calculate the maximum value for and its frequency to create the lookup table.
Finally, applying encoding/decoding operation for the message. The results of the proposed method are considered more efficient, secure and less time consuming compared with the ECC algorithm, besides it's suitable for preserving the confidentiality for real-time applications.
The objective of this work is to study the concept of a fuzzy -cone metric space And some related definitions in space. Also, we discuss some new results of fixed point theorems. Finally, we apply the theory of fixed point achieved in the research on an integral type.
Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MorePredicting the network traffic of web pages is one of the areas that has increased focus in recent years. Modeling traffic helps find strategies for distributing network loads, identifying user behaviors and malicious traffic, and predicting future trends. Many statistical and intelligent methods have been studied to predict web traffic using time series of network traffic. In this paper, the use of machine learning algorithms to model Wikipedia traffic using Google's time series dataset is studied. Two data sets were used for time series, data generalization, building a set of machine learning models (XGboost, Logistic Regression, Linear Regression, and Random Forest), and comparing the performance of the models using (SMAPE) and
... Show MoreIn this research, a Co-polymer (Styrene / Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside) was synthesized from glucose in four steps using Addition Polymerization according to the radical mechanism using Benzoyl Peroxide (BP) as initiator. Initially, Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside monomer was prepared in three steps and the reaction was followed by (HPLC, FT-IR, TLC), in the fourth step the monomer was polymerized with Styrene and the structure was determined by FT-IR and NMR spectroscopy. The reaction conditions (temperature, reaction time, material ratios) were also studied to obtain the highest yield, the relative, specific and reduced viscosity of the prepared polymer was determined, from which the viscosity ave
... Show MoreArtificial Neural Network (ANN) is widely used in many complex applications. Artificial neural network is a statistical intelligent technique resembling the characteristic of the human neural network. The prediction of time series from the important topics in statistical sciences to assist administrations in the planning and make the accurate decisions, so the aim of this study is to analysis the monthly hypertension in Kalar for the period (January 2011- June 2018) by applying an autoregressive –integrated- moving average model and artificial neural networks and choose the best and most efficient model for patients with hypertension in Kalar through the comparison between neural networks and Box- Je
... Show MoreMany organizations today are interesting to implementing lean manufacturing principles that should enable them to eliminating the wastes to reducing a manufacturing lead time. This paper concentrates on increasing the competitive level of the company in globalization markets and improving of the productivity by reducing the manufacturing lead time. This will be by using the main tool of lean manufacturing which is value stream mapping (VSM) to identifying all the activities of manufacturing process (value and non-value added activities) to reducing elimination of wastes (non-value added activities) by converting a manufacturing system to pull instead of push by applying some of pull system strategies a
... Show MoreIn Incremental sheet metal forming process, one important step is to produce tool path, an
accurate tool path is one of the main challenge of incremental sheet metal forming
process. Various factors should be considered prior to generation of the tool path i.e.
mechanical properties of sheet metal, the holding mechanism, tool speed, feed rate and
tool size. In this work investigation studies have been carried out to find the different tool
path strategies to control the twist effect in the final product manufactured by single point
incremental sheet metal forming (SPIF), an adaptive tool path strategy was proposed and
examined for several Aluminum conical models. The comparison of the proposed tool path with t
The immunity enjoyed by members of parliament is one of the most important guarantees for the performance of their parliamentary work, which protects them from threats or any reprisals against them.
There are two types of immunity:
Objective immunity: the member does not bear any responsibility for the opinions, ideas, and statements he expresses within the council or its committees, but even outside it by some systems.
Procedural immunity: that prevents criminal actions from being taken during or outside the session of the Council, with the approval of a body specified by the constitutions of the countries under study, but it is restricted by conditions and controls stipulated. It contains constitut
... Show MoreThe integral transformations is a complicated function from a function space into a simple function in transformed space. Where the function being characterized easily and manipulated through integration in transformed function space. The two parametric form of SEE transformation and its basic characteristics have been demonstrated in this study. The transformed function of a few fundamental functions along with its time derivative rule is shown. It has been demonstrated how two parametric SEE transformations can be used to solve linear differential equations. This research provides a solution to population growth rate equation. One can contrast these outcomes with different Laplace type transformations