The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
The present work involved preparation of new hetro cyclic polyacrylamides (1-9) using reaction of polyacryloyl chloride with 2-aminobenzothiazole which prepeard by thiocyanogen method in the presence of a suitable solvent and amount tri ethyl amine (Et3N) with heating. The structure confirmation of polymers were proved using FT-IR,1H-NMR,C13NMR and UV spectroscopy.Other physical properties including softening and melting points, and solubility of the polymers were also measured.
This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreNew Schiff bases derived from D-galactose were synthesized by condensation of aldehyde (1,2:3,4-Di-O-isopropylidene-6-carboxaldehyde-α-D-galactopyranose) with different aromatic amines such as (4-bromo, 3-hydroxy, 4-iodo, 4-methoxy) aniline in dry benzene using glacial acetic acid as a catalyst. These compounds were converted to oxazepine derivatives by addition reaction with maleic anhydride in dry benzene as a solvent. The structures of the synthesized compounds have been characterized by elemental analysis, FTIR spectra, some of them by using 1HNMR spectra and measurement of its physical properties.
The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
الخلاصة لقد شكل المحافظون الجدد وهم بالأساس نخبة من المثقفين ومن السياسيين الأمريكيين كتلة ضغط كبيرة التأثير على الإدارة في عهد الجمهوريين. حمل هؤلاء المحافظون مشروعاً إيديولوجياً البسوه لسلطة الجمهوريين وهو يهدف إلى جعل أمريكا سيدة العالم من دون منازع خاصة بعد انهيار الاتحاد السوفييتي ونهاية الحرب الباردة. واكب هذا الحدث التاريخي الكثير من الأفكار ومنها (نهاية التاريخ)، وصراع الحضارات، وكذ
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe research deals with the concept of a New Urbanism as an urban development strategy in the suburbs of cities or in its centers that are affected by pedestrian-oriented design and the possibility of walking, as well as integrating economic classes through the diversity of housing and its costs, and this works to facilitate access to jobs and services while providing more diverse neighborhoods and reducing the use of cars , As designing separate houses in the suburbs and increasing car trips poses a threat to the environment and the quality of urban life, and thus the new urban provides a good strategy for developing
... Show MoreThere are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim
... Show MoreIbuprofen is one of the most important members of NSAIDs, named aryl propionic acid derivative. Isatin (1H-indole-2,3-dione) is an important molecule of heterocyclic compounds that have many biological activities. This work illustrates the synthesis of new ibuprofen-isatin derivatives by connecting ibuprofen hydrazide with different isatin derivatives by a condensation reaction, followed by characterization by fourier-transform infrared spectroscopy (FTIR) and proton nuclear magnetic resonance (1H-NMR) spectroscopy. The anti-inflammatory activity was evaluated by using the egg-white induce edema method for all the synthesized compounds (5-8), the compounds 5 and 6 showed better anti-inflammatory activity than ibuprofen as a standard
... Show More