An encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s
... Show MoreThe effect of air injection device on the performance of airlift pump used for water pumping has been studied numerically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 22.5 (for modified). Continuity and Navier-Stokes equations in turbulent regime with an appropriate two-phase flow model (VOF) and turbulent model ( ) in two dimensions axisymmetry flow were formulated and solved by using the known package FLUENT version (14.5). The numerical and experimental investiga
... Show MoreThis study investigates the characterization and mechanical performance of Stone Mastic Asphalt (SMA) mixtures modified with two types of polymers: styrene–butadiene–styrene (SBS) and high-molecular-weight polyethylene (PE). Neat asphalt cement PG 64-16 was modified using a higher content of SBS and PE at concentrations of 6%, 7%, and 8% by weight of asphalt through the dry blending method to produce Highly Modified Asphalts (HiMA). The physical and rheological properties of the modified binders were evaluated using penetration, softening point, rotational viscosity, and dynamic shear rheometer (DSR) tests. Also, their phase compatibility and morphological changes were evaluated using the storage stability testing and scanning electron
... Show MoreThe new novel polymers nanocomposites based modified chitosan (CS) blending with polyvinyl alcohol (PVA) and coated gold or silver nanoparticles (AuNPs), AgNPs) were synthesized from many sequence reactions as presented in (Scheme1, 2 and 3). By utilizing 1H-NMR spectroscopy, FTIR, and Field Emission Scanning electron microscope , the synthesized compounds have been identified. Molecular docking is studied, where operations are used to predict the binding status of compounds with the enzyme and to calculate the free energy (ΔG) of the compounds prepared. Also, the antibacterial activity regarding the synthesized compounds against two resistant pathogenic bacteria (G+) S. aureus and E. coli (G-) was examined in vitro compare with standard a
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreThis study proposed using color components as artificial intelligence (AI) input to predict milk moisture and fat contents. In this sense, an adaptive neuro‐fuzzy inference system (ANFIS) was applied to milk processed by moderate electrical field‐based non‐thermal (NP) and conventional pasteurization (CP). The differences between predicted and experimental data were not significant (
Hybrid architecture of ZnO nanorods/graphene oxide ZnO-NRs@GO synthesized by electrostatic self-assembly methods. The morphological, optical and luminescence characteristics of ZnO-NRs@GO and ZnO-NRs thin films have been described by FESEM, TEM, HRTEM, and AFM, which refers to graphene oxide have been coated ZnO-NRs with five layers. Here we synthesis ZnO-NRs@GO by simple, cheap and environmentally friendly method, which made it favorable for huge -scale preparation in many applications such as photocatalyst. ZnO-NRs@GO was applied as a photocatalyst Rodamin 6 G (R6G) dye from water using 532 nm diode laser-induced photocatalytic process. Overall degradation of R6G/ ZnO-NRs@GO was achieved after 90 minutes of laser irradiation while it ne
... Show MoreThe nanostructured MnO2 /carbon fiber (CF) composite electrode was prepared using the anodic electrodeposition process. The crystal structure and morphology of MnO2 particles were determined with X-ray diffraction and field-emission scanning electron microscopy. The electrosorptive properties of the prepared electrode were investigated in the removal of cadmium ions from aqueous solution, and the effect of pH, cell voltage, and ionic strength was optimized and modeled using the response surface methodology combined with Box–Behnken design. The results confirm that the optimum conditions to remove Cd(II) ions were: pH of 6.03, a voltage of 2.77 V, and NaCl concentration of 3 g/L. The experimental results showed a good fit for the Freundli
... Show More