: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.
A procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed
... Show MoreThis paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
This study aims to assess the water quality index (WQI) according to the Canadian Council of Ministers of the Environment's Water Quality Index method (CCME WQI). Four locations (measurement stations) are selected along the Tigris River, in Iraq. Two of them are located in the north near Mosul City, (Mosul Dam and Mosul city), and the other two are located in the south near Al-Amarah city, (Ali Garbi and Al-Amarah). The water data collected is for the period 2011 to 2013, including eleven water quality parameters. These are magnesium (Mg+2), calcium (Ca2+), potassium (K+), sodium (Na+), sulfate (SO42-), chloride (Cl-), nitrate (NO3<
... Show MoreIn the present study, silver nanoparticles (AgNPs) were prepared using an eco-friendly method synthesized in a single step biosynthetic using leaves aqueous extract of Piper nigrum, Ziziphus spina-christi, and Eucalyptus globulus act as a reducing and capping agents, as a function of volume ratio of aqueous extract(100ppm) to AgNO3 (0.001M), (1: 10, 2: 10, 3: 10). The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AgNPs showed surface Plasmon resonance centered at 443, 440, and 441 nm for sample prepared using extract Piper nigrum, Ziziphus spina-christi, and Eucalyptus respectively. The XRD pattern showed that the strong intense peaks
In this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The value
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
There is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreThe study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.