In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
A rapid, simple and sensitive spectrophotometric method for the determination of trace amounts of chromium is studied. The method is based on the interaction of chromium with indigo carmine dye in acidic medium and the presence of oxalates as a catalyst for interaction, and after studying the absorption spectrum of the solution resulting observed decrease in the intensity of the absorption. As happened (Bleaching) for color dye, this palace and directly proportional to the chromium (VI) amount was measured intensity of the absorption versus solution was figurehead at a wavelength of 610 nm. A plot of absorbance with chromium (VI) concentration gives a straight line indicating that Beer’s law has been obeyed over the range of 0.5
... Show MoreThe invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of
... Show MoreThe manuscript should contain an abstract. The abstract should be self-contained and citation-free and should not exceed 200 words. The abstract should state the purpose, approach, results and conclusions of the work. The author should assume that the reader has some knowledge of the subject but has not read the paper. Thus, the abstract should be intelligible and complete in it-self (no numerical references); it should not cite figures, tables, or sections of the paper. The abstract should be written using third person instead of first perso The fast microwave assisted pyrolysis (FMWAP) of water hyacinth (WH) for biochar production is investigated. Taguchi’s method was used to optimize FMWAP parameters. The effects of microwave
... Show MoreBiosorption of cadmium ions from simulated wastewater using rice husk was studied with initial concentration of 25 mg/l. Equilibrium isotherm was studied using Langmuir, Freundlich, BET and Timken models. The results show that the Freundlich isotherm is the best fit model to describe this process with high determination coefficient equals to 0.983. There was a good compliance between the experimental and theoretical results. Highest removal efficiency 97% was obtained at 2.5g of adsorbent, pH 6 and contact time 100 min.
Root-finding is an oldest classical problem, which is still an important research topic, due to its impact on computational algebra and geometry. In communications systems, when the impulse response of the channel is minimum phase the state of equalization algorithm is reduced and the spectral efficiency will improved. To make the channel impulse response minimum phase the prefilter which is called minimum phase filter is used, the adaptation of the minimum phase filter need root finding algorithm. In this paper, the VHDL implementation of the root finding algorithm introduced by Clark and Hau is introduced.
VHDL program is used in the work, to find the roots of two channels and make them minimum phase, the obtained output results are
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More