Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content according to Hausdorff Distance (HD) approximately around 100 after the encryption process. It provides a high security against brute force attack because it has large key space equal to 10165 and secret key sensitivity using NPCR near 99:6% and UACI near 33:4%. The histogram and HD indicate the decrypted 3D content is identical to the origin where HD values approximate zero.
The concepts of nonlinear mixed summable families and maps for the spaces that only non-void sets are developed. Several characterizations of the corresponding concepts are achieved and the proof for a general Pietsch Domination-type theorem is established. Furthermore, this work has presented plenty of composition and inclusion results between different classes of mappings in the abstract settings. Finally, a generalized notation of mixing maps and their characteristics are extended to a more general setting.
A new mode of methodology was adopted in the assay of PM- HCL based on the use of water crystal gel bead made of poly acrylic acid in which the gel beads were left to absorbe persulphate solution that is necessary for the oxidation of PM- HCL in aqua media . The water crystal act as a reserviour for S2O82- . Optimum parameters were studied giving to specify the chemical and physical parameters. Two line manifold was used .The flow rates of 1.5 and 1.2 ml.min-1 was used , 3 gel beads , 120 μL sample volume , a linear dynamic range extend from 0.01- 18 mmol.L-1. A correlation coefficient (r) of 0.9991while the percentage linearity (r2%) of 99.82% with R.S.D% at 8 mmol.L-1 promethazine-HCl is less than 0.5% (ten replicates) and a detection
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
Normal concrete is weak against tensile strength, has low ductility, and also insignificant resistance to cracking. The addition of diverse types of fibers at specific proportions can enhance the mechanical properties as well as the durability of concrete. Discrete fiber commonly used, has many disadvantages such as balling the fiber, randomly distribution, and limitation of the Vf ratio used. Based on this vision, a new technic was discovered enhancing concrete by textile-fiber to avoid all the problems mentioned above. The main idea of this paper is the investigation of the mechanical properties of SCC, and SCM that cast with 3D AR-glass fabric having two different thicknesses (6, 10 mm), and different layers (1,2 laye
... Show MoreOptimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall publishing cost. This study proposes and investigates a multi-level optimization algorithm based on Binary Particle Swarm Optimization (BPSO). It aims to an optimal multi-floor AP placement with effective coverage that makes it more capable of supporting QOS and cost effectiveness. Five pairs (coverage, AP placement) of weights, signal threshol
In this research, we propose to use two local search methods (LSM's); Particle Swarm Optimization (PSO) and the Bees Algorithm (BA) to solve Multi-Criteria Travelling Salesman Problem (MCTSP) to obtain the best efficient solutions. The generating process of the population of the proposed LSM's may be randomly obtained or by adding some initial solutions obtained from some efficient heuristic methods. The obtained solutions of the PSO and BA are compared with the solutions of the exact methods (complete enumeration and branch and bound methods) and some heuristic methods. The results proved the efficiency of PSO and BA methods for a large number of nodes ( ). The proposed LSM's give the best efficient solutions for the MCTSP for
... Show MoreIn this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of