Summary
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.
The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics. The Torah specified all these laws with several texts
Actinomycetes are free, spore-forming, high (G+C) ratio (>55%) saprophytic microorganisms that are widely distributed in most soils, colonize plants, and are prevalent in water. This is frequently accompanied by the production of filament airborne mycelium. Actinomycetes are well-known microcolonies for creating antibiotics and other critical bioactive components that are beneficial to humans. Approximately 70% to 80% of commercially available medications and antiviral active compounds have been synthesized so far. Secondary metabolites produced by microbes have the potential to be used in a variety of sectors, including antimicrobial agents, enzyme technology, pigment manufacture, antitumor agents against cancer cells, and toxin pr
... Show MoreCopper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data