A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statistical tests of the generated sequence of bits are investigated by applying five evaluations as well as the ACF and NIST. The results of five standard tests of randomness have been illustrated and overcome a value of 0.160 in frequency test. While the run test presents the pass value t0=4.769 and t1=2.929. Likewise, poker test and serial test the outcomes was passed with 3.520 for poker test, and 4.720 for serial test. Finally, autocorrelation test passed in all shift numbers from 1 to 10.
A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe location of the study area is surging hills in Bongomene area, Gorontalo, Indonesia. In this study, a geological survey and sampling were taken, and then an analysis of the content of benthic foraminifera was performed in each sample. The study aims to discover the species of benthic foraminifera fossils and to determine the paleobathymetry to the studied regions. The results of the analysis contained seven fossils species, namely Ammomassilina alveoliniformis, Stelligerum astrononion, Haynesia germanica, Nonion fabum, Praeglobobulimina ovata, Rhabdammina discreata and Saccorhiza ramosa. Based on the content of benthic foraminifera fossils, paleobathymetry is determined as Middle Shelf to Outer
... Show MoreSex chromatin (SC) is defined as inactive X chromosome in the female somatic cells, it condensed as heterochromatic at interphase of the nucleus and appears like nuclear satellite projection, and only female cells contain SC in mammals. Different ages of cocks: immature (8,16 weeks old), growing (24 weeks old) and production age (32,48 weeks old) , were studied to detect the sex chromatin (SC) with it's various shapes :Sessile nodule(SS), Drum stick(DS), Tear drop(TD) and Club shape(CS) in the blood lymphocytes of blood smears prepared from WBCs of 45 New Hampshire(NH) strain cocks. Also SC measurements were detected which include: vertical (V) and horizontal (H) axes, SC area (SCA), nuclear area (NA), and the
... Show MoreMany of the elementary transformations of determinants which are used in their evaluation and in the solution of linear equations may by expressed in the notation of matrices. In this paper, some new interesting formulas of special matrices are introduced and proved that the determinants of these special matrices have the values zero. All formulation has been coded in MATLAB 7.
Simplification of new fashion design methods
In this work, we introduce a new kind of perfect mappings, namely j-perfect mappings and j-ω-perfect mappings. Furthermore we devoted to study the relationship between j-perfect mappings and j-ω-perfect mappings. Finally, certain theorems and characterization concerning these concepts are studied; j = , δ, α, pre, b, β
Phenoxathiin was prepared by the reaction of diphenyl ether with sulfur in the presence of anhydrous aluminum chloride. This work comprised the synthesis of new phenoxathiin derivatives containing heterocyclic moieties. These heterocyclic compounds were synthesized in three groups. The first group was made up of 2-(oxoalken-1-yl) phenoxathiin derivatives (3a-3j) obtained from the reaction of 2-acetylphenoxathiin with different aromatic aldehyde in the presence of sodium hydroxide. The other two groups involved compounds produced from the reaction of (3a-3j) with hydrazine hydrate in acetic acid to get 2-(1-acetyl pyrazolin-3-yl) phenoxathiin derivatives (4a-4j), and phenyl hydrazine in the presence of piperidine to afford 2-(1-phenyl pyrazo
... Show More