One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Background: Bone mineral density (BMD) has been assessed using Dual-Energy X-ray absorptiometry (DEXA). This procedure is considered to be of vital importance in assessing the general condition of individuals concerning their skeletal mineralization. BMD is measured according to the results of the DEXA examination of the vertebral column and pelvis. Although diabetes mellitus (D.M.)is known to affect BMD, the information regarding this relationship is not currently particularly clear. Objective: This study concentrates on the point that the assessment of BMD for the vertebral column is insuffi-cient to give a realistic and correct picture of the mineralization of the remaining part of the skeleton. Besides, this study elicited a gen
... Show MoreI n this paper ,we 'viii consider the density questions associC;lted with the single hidden layer feed forward model. We proved that a FFNN with one hidden layer can uniformly approximate any continuous function in C(k)(where k is a compact set in R11 ) to any required accuracy.
However, if the set of basis function is dense then the ANN's can has al most one hidden layer. But if the set of basis function non-dense, then we need more hidden layers. Also, we have shown that there exist localized functions and that there is no t
... Show MorePyrolysis of high density polyethylene (HDPE) was carried out in a 750 cm3 stainless steel autoclave reactor, with temperature ranging from 470 to 495° C and reaction times up to 90 minute. The influence of the operating conditions on the component yields was studied. It was found that the optimum cracking condition for HDPE that maximized the oil yield to 70 wt. % was 480°C and 20 minutes. The results show that for higher cracking temperature, and longer reaction times there was higher production of gas and coke. Furthermore, higher temperature increases the aromatics and produce lighter oil with lower viscosity.
Abstract
The logistic regression model is one of the nonlinear models that aims at obtaining highly efficient capabilities, It also the researcher an idea of the effect of the explanatory variable on the binary response variable. &nb
... Show MoreThis paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAn effective two-body density operator for point nucleon system folded with two-body correlation functions, which take account of the effect of the strong short range repulsion and the strong tensor force in the nucleon-nucleon forces, is produced and used to derive an explicit form for ground state two-body charge density distributions (2BCDD's) and elastic electron scattering form factors F (q) for 19F, 27Al and 25Mg nuclei. It is found that the inclusion of the two-body short range correlations (SRC) has the feature of reducing the central part of the 2BCDD's significantly and increasing the tail part of them slightly, i.e. it tends to increase the probability of transferring the protons from the central region of the nucleus towards
... Show MoreThe study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n
... Show More