In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection
Bootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThe intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.
That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreFree Piston Engine Linear Generator (FPELG) is a modern engine and promising power generation engine. It has many advantages compared to conventional engines such as less friction, few numbers of parts, and high thermal efficiency. The cycle-to-cycle variation one of the big challenges of the FPELG because it is influence on the stability and output power of the engine. Therefore, in this study, the effect of ignition time on combustion characteristics is investigated. The single-cylinder FPELG with spark ignition (SI) combustion type by using compressed natural gas (CNG) fuel type was set to run. LabVIEW is used to run the engine and control of input parameters. All experimental data
This study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreImproving in assembling technology has provided machines of higher evaluation with better resistances and managed behavior. This machinery led to remarkably higher dynamic forces and therefore higher stresses. In this paper, a dynamic investigation of rectangular machine diesel and gas engines foundation at the top surface of one-layer dry sand with various states (i.e., loose, medium and dense) was carried out. The dynamic investigation is performed numerically by utilizing limited component programming, PLAXIS 3D. The soil is accepted as flexible totally plastic material submits to Mohr-Coulomb yield basis. A harmonic load is applied at the foundation with amplitude of 10 kPa at a frequency of (10, 15 and 20) HZ and se
... Show More