The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreIn this work, N-hydroxy phthalimide derivatives (NHPID) were synthesized from the nucleuphilic substitution reactions of (NHPI) with different halides (alkyl halides, sulfonyl halides, benzoyl halides and benzyl halides). The products were distinguished using FTIR spectrum and Nuclear magnetic resonsnce (1H-NMR and 13CNMR), in addition to other characteristic methods such as sodium fution for sulfur determination. followed by measuring antibacterial (with different types of gram positive/gram negative bacteria) and antifungal activities of these compounds.
In-vitro biological activities of the free new H4L ( indole-7-thiocarbohydrazone) ligand and its Ni(II), Pd(II) , Pt(II), Cu(II), Ag(I), Zn(II) and Cd(II) complexes are screened against two cancerous cell lines, that revealed significant activity only for [Cu2Cl2(H4L)2(PPh3)2] after 72 h treatment by the highest tested concentrations. The Copper(I) complex was characterized by X-ray Crystallography and the NMR spectra, whereas it has been confirmed to have momentous cytotoxicity against ovarian, breast cancerous cell lines (Caov-3, MCF-7). The apoptosis-inducing properties of the Cu(I) complex have been investigated through fluorescence microscopy visualization, DNA fragmentation analysis and propidium iodide flow cytometry.
In this work 5-methylene-yl - (2-methy –oxazole-4-one) (1H) imidazole (1) were synthesized from the reaction of L-Histidine with acetic anhydride and which converted to the of 5-methylene-yl-(2-methyl 3-amino imidazole-4-one)-1H-imidazole (2) by reaction with hydrazine hydrate. Schiff bases (3-6) were synthesized from the reaction of compound (2) with different aromatic aldehyde. Reaction of compounds (3-6) with chloroacetyl chloride gives azetidinone one derivatives (7-10). These compounds were characterized by FT-IR and some of them with 1H-NMR and 13C-NMR spectroscopy.
Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreIn this paper, we introduce the notions of Complete Pseudo Ideal, K-pseudo Ideal, Complete K-pseudo Ideal in pseudo Q-algebra. Also, we give some theorems and relationships among them are debated.
The present study was designed to synthesize a number of new Ceftriaxone derivatives by its involvement with a series of different amines, through the chemical derivatization of its 2-aminothiazolyl- group into an amide with chloroacetyl chloride, which on further conjugation with these selected amines will produce compounds with pharmacological effects that may extend the antimicrobial activity of the parent compound depending on the nature of these moieties.
Ceftriaxone was first equipped with a spacer arm (linker) by the action of chloroacetyl chloride in aqueous medium and then further reacted with seven different aliphatic and aromatic amines which resulted in the production of the aimed final target products. The syntheses
... Show More