One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreThe ground state proton, neutron and matter densities of exotic 11Be and 15C nuclei are studied by means of the TFSM and BCM. In TFSM, the calculations are based on using different model spaces for the core and the valence (halo) neutron. Besides single particle harmonic oscillator wave functions are employed with two different size parameters Bc and Bv. In BCM, the halo nucleus is considered as a composite projectile consisting of core and valence clusters bounded in a state of relative motion. The internal densities of the clusters are described by single particle Gaussian wave functions.
Elastic electron scattering proton f
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreAbstractIn the field of construction materials the glass reinforced mortar and Styrene Butadiene mortar are modern composite materials. This study experimentally investigated the effect of addition of randomly dispersed glass fibers and layered glass fibers on density and compressive strength of mortar with and without the presence of Styrene Butadiene Rubber (SBR). Mixtures of 1:2 cement/sand ratio and 0.5 water/cement ratio were prepared for making mortar. The glass fibers were added by two manners, layers and random with weight percentages of (0.54, 0.76, 1.1 and 1.42). The specimens were divided into two series: glass-fiber reinforced mortar without SBR and glass-fiber reinforced mortar with 7% SBR of mixture water. All s
... Show More
The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.