In this paper a design of new robust and dynamic cryptosystem using stream key generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexible to encrypt (decrypt) different types of data; like message text and image data efficiently. Also we suggest using software protection for RDSCC which is represented by partitioned the cryptosystem file into two parts, each one saved in different memories to keep it in save from any attack. Lastly, the proposed generator and the cryptosystem are implemented practically and the main interfaces of the two programs are shown in this paper. These interfaces are programmed with GUI MATLAB2017.
Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel
... Show MoreCADTEL software was developed to provide the simplest and most versatile computing resource that a wide range of skilled researchers and designers can use. In this paper, a development on this program, relying on sixteen mathematical models, produced a new version of CADTEL software package which focuses on the optimum conditions of Scherzer imaging for round electron magnetic lenses.. These models depend on synthesis procedure which is mainly designed to work with the inverse design problem, and represent the axial magnetic flux density of desirable electron magnetic lens which can be proposed or selected , using the four (zero, low, high, infinite) magnification states. The p
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreHigh-performance liquid chromatographic methods are used for the determination of water-soluble vitamins with UV-Vis. Detector. A reversed-phase high-performance liquid chromatographic has been developed for determination of water-soluble vitamins. Identification of compounds was achieved by comparing their retention times and UV spectra with those of standards solution. Separation was performed on a C18 column, using an isocratic 30% (v/v) acetonitril in dionozed water as mobile phase at pH 3.5 and flow rate 1.0m/min. The method provides low detection and quantification limits, good linearity in a large concentration interval and good precision. The detection limits ranged from 0.01 to 0.025µg/ml. The accuracy of the method was
... Show MoreBackground: Poly (methyl methacrylate) has been widely utilized for fabrication of dentures for many years as it has good advantages but not achieved all demands of the mechanical properties such as low transverse strength, low impact strength, low surface hardness, high water solubility and high water sorption. Material and method: To provide bonding between ZrO2 nanoparticles and PMMA matrix, the ZrO2 Nano-fillers were surface-treated with a saline coupling agent. Plasma surface treatment of polyethylene (PE) fiber was done to change surface fiber by using DC- glow discharge system. For characterization of interring any functional groups, the (FTIR) spectrum were done .then the mechanical properties studied to choose the appropriate perc
... Show MoreThe Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreCantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successfully wi
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.