The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to results obtained in this paper, KCHS needs less search time than others algorithms and gives very acceptable performance quality.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method and the Standard Bayes method with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform
... Show MoreA new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show MoreCyberbullying is one of the major electronic problems, and it is not a new phenomenon. It was present in the traditional form before the emergence of social networks, and cyberbullying has many consequences, including emotional and physiological states such as depression and anxiety. Given the prevalence of this phenomenon and the importance of the topic in society and its negative impact on all age groups, especially adolescents, this work aims to build a model that detects cyberbullying in the comments on social media (Twitter) written in the Arabic language using Extreme Gradient Boosting (XGBoost) and Random Forest methods in building the models. After a series of pre-processing, we found that the accuracy of classification of t
... Show MoreBraces in straight bridge systems improve the lateral-torsional buckling resistance of the girders by reducing the unbraced length, while in horizontally curved and skew bridges, the braces are primary structural elements for controlling deformations by engaging adjacent girders to act as a system to resist the potentially large forces and torques caused by the curved or skewed geometry of the bridge. The cross-frames are usually designed as torsional braces, which increase the overall strength and stiffness of the individual girders by creating a girder system that translates and rotates as a unit along the bracing lines. However, when they transmit the truck’s live load forces, they can produce fatigue cracks at their connection
... Show MoreCams are considered as one of the most important mechanical components that depends the contact action to do its job and suffer a lot of with drawbacks to be predicted and overcame in the design process. this work aims to investigate the induced cam contact and the maximum shear stress energy or (von misses) stresses during the course of action analytically using Hertz contact stress equation and the principal stress formulations to find the maximum stress value and its position beneath the contacting surfaces. The experimental investigation adopted two dimensions photoelastic technique to analyze cam stresses under a plane polarized light. The problem has been numerically simulated using Ansys software version 15 as FE
... Show More