In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreIn this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
Visible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreBackground: The main aim of the present study is to qualify and quantify voids formation of root canals obturated with GuttaCore (GC) and experimental Hydroxyapatite polyethylene (HA/PE) as new carrier-based root canal fillings by using micro computed tomography scan. Materials and methods: In the present study, eight straight single-rooted human permanent premolar teeth are selected and disinfected, then stored in distilled water. The teeth decoronated leaving a root length of 12mm each. The root canals instrumented by using crown down technique and the apical diameter of the root canal prepared to a size # 30/0.04 for achieving standardized measurements. A 5mL of 17% EDTA used to remove the smear layer followed by 5mL of 2.5% NaOCl and r
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti
... Show More2-hydrazinylbenzo[d]thiazole compound [1] is produced from reaction of 2-mercapto-benzothiazole with hydrazine hydride in ethanol. Compound [1] reacted with maleic anhydride in DMF to produce (Z)-4-(2-(benzo[d] thiazol-2yl) hydrazinyl)-4-oxobut-2-enoic acid [compound (2)]. While the treatment of compound [2] with the ammonium persulfate (NH4)2S2O8 (as the initiator) in order to produce compound [3], then compound [3] reacted with thionyl chloride in benzene to produce compound [4], finally compound [4] reaction with various drugs: cephalexin, amoxicillin, sulfamethizole, elecoxib obtained polymers [5–8]. The structure of synthesized compounds identified by spectral data: fourier transform infrared (FTIR) and proton nuclear magneti
... Show MoreThis study investigated the healing effects of topical application of zerumbone, a well‐known anti‐inflammatory compounds loaded on nanostructured lipid carrier gel (Carbopol 940) (ZER‐NLCG) on excisional wounds in streptozotocin‐induced diabetic rats. Diabetic rats with inflicted superficial skin wound were topically treated with ZER‐NLCG, empty NLCG, and silver sulfadiazine cream (SSDC) once daily for 21 days. Wound tissue samples were analyzed for proinflammatory cytokines, namely, interleukin‐6 (IL‐6), interleukin‐1
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More