This study seeks to answer urgent questions about the role of new media that have emerged recently, such as the Internet and social networking sites and information services through mobile and others to increase awareness among young people, especially university students. during a field study that took place on a sample of students in the Department of Media at the University of Petra Kingdom of Jordan during the second semester in 2013 in the study the researcher finds increased attention and follow-up by young people for many of the world events and regional and local communities through exposure to a number of new media; in the forefront of the Internet and increase the level of awareness and interests young people do many of the eve
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MorePropranolol is a nonselective-adrenergic blocker used in the treatment of hypertension, cardiac arrhythmias, and angina pectoris. A significant problem in propranolol therapy is that it undergoes extensive presystemic metabolism after oral administration leading to reduced bioavailability. In this study, two new propranolol derivatives have been designed, synthesized and characterized. These compounds were formed by acylation of propranolol followed by nucleophilic substitution reaction of acylated propranolol, these derivatives were analyzed for IR, CHN, melting points, and evaluated for their lipophilic properties compared with propranolol. The lower partition coefficient of these two derivatives revealed that the prodrug approach may be
... Show MoreIn this work a series of fourteen new compounds were synthesized. Compound [1] was formed from the reaction of 2-aminobenzothiazole and p-bromophenacyl bromide. Aldehyde group [2] was obtained from the reaction of compound [1] with pocl3 in presence of DMF and CHCl3 .After that shiff bases have been synthesized from the reaction of compound [2] with different aromatic amine to give new shiff bases [3- 5]. These new shiff bases have been reduced to their corresponding amine [6-8] by means of sodium borohydride. Then reaction of shiff bases [3-5] with phenyl isocyanate gives 3-cyclic lactam derivatives [9-11]. 3-cyclic Oxazepine derivatives [12-14] were obtained by reaction of shiff bases [3-5] with succinic anhydride. These new formed co
... Show MoreIncremental sheet metal forming is a modern technique of sheet metal forming in which a uniform sheet is locally deformed during the progressive action of a forming tool. The tool movement is governed by a CNC milling machine. The tool locally deforms by this way the sheet with pure deformation stretching. In SPIF process, the research is concentrate on the development of predict models for estimate the product quality. Using simulated annealing algorithm (SAA), Surface quality in SPIF has been modeled. In the development of this predictive model, spindle speed, feed rate and step depth have been considered as model parameters. Maximum peak height (Rz) and Arithmetic mean surface roughness (Ra) are used as response parameter to assess th
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreIn this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More