The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAcceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show MoreThis study seeks to answer urgent questions about the role of new media that have emerged recently, such as the Internet and social networking sites and information services through mobile and others to increase awareness among young people, especially university students. during a field study that took place on a sample of students in the Department of Media at the University of Petra Kingdom of Jordan during the second semester in 2013 in the study the researcher finds increased attention and follow-up by young people for many of the world events and regional and local communities through exposure to a number of new media; in the forefront of the Internet and increase the level of awareness and interests young people do many of the eve
... Show MoreThis paper aims to introduce certain new kinds of ideals on pseudo-BG-Algebra (P-BG-A), such as pseudo-closed ideal (P-CI), pseudo-completely closed ideal (P-CCI), and pseudo-n-ideal (P-n-I). Firstly, a (P-n-I) is defined and its pertinent properties are explored. Some important properties have been proven, for example, any pseudo-ideal is a (P-n-I), but the opposite is not generally true, an example was given of the opposite direction. Also, every pseudo-subalgebra of a (P-BG-A) is a pseudo ideal and it is a (P-n-I). Secondly, (P-CI) and a (P-CCI) ideal are defined. After that, we prove that every pseudo-subalgebra of a (P-BG-A) is a (P-CI) and the converse is true. The relationship between (P-BG-A) and pseudo-BH-algebra is demonstrated un
... Show MoreThis work includes two steps of synthesis, the first one is the synthesis of indole which was prepared according to literature of the reaction of phenyl hydrazine with acetaldehyde in glacial acetic acid afforded phenyl hydrazone of acetaldehyde , this product was fused with zinc chloride to give the indole.Reaction of cyclohexanone with phenyl hydrazine using the same procedure for the preparing giving 1,2,3,4-Tetrahydrocarbazole.Second step involved synthesis of a series of (17) of mannich bases derivatives of indole and 1,2,3,4-Tetrahydrocarbazle. Mannich reaction involves the condensation of aldehyde usually formaldehyde with different secondary amine and with compound containing an activated hydrogen.The reaction illustrated by the fo
... Show MoreIn this work a series of fourteen new compounds were synthesized. Compound [1] was formed from the reaction of 2-aminobenzothiazole and p-bromophenacyl bromide. Aldehyde group [2] was obtained from the reaction of compound [1] with pocl3 in presence of DMF and CHCl3 .After that shiff bases have been synthesized from the reaction of compound [2] with different aromatic amine to give new shiff bases [3- 5]. These new shiff bases have been reduced to their corresponding amine [6-8] by means of sodium borohydride. Then reaction of shiff bases [3-5] with phenyl isocyanate gives 3-cyclic lactam derivatives [9-11]. 3-cyclic Oxazepine derivatives [12-14] were obtained by reaction of shiff bases [3-5] with succinic anhydride. These new formed co
... Show MoreA set newly complexes with the general formula [M(L)Cl2] are resulting from the reaction of a new schiff base ligand [Ethyl (6R,7R)-7-((E)-2-((2-ethoxy-2- oxoethoxy)imino)-2-(2-(((E)-4-nitrobenzylidene) amino) thiazol -4- yl) acetamido) -8- oxo -3- vinyl -5- thia -1-aza bicyclo [4. 2.0] oct -2- ene -2- carboxylate] (L). This ligand was derived from the reaction of the two substances 4-nitrobenzaldehyde and precursor (P). Reaction the ligand with metal ions M= Mn(II), Co(II), Ni(II), Cu(II) and Cd(II) afforded new complexes which are characterized by FT-IR and Electronic Spectra. These measurements indicate that the complexes have a tetrahedral geometry. The Penicillin-Binding Protein 3 (PBP3) of Staphylococcus aureus and the target protein
... Show MoreBackground: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreSocial media has become an essential educational tool nowadays. Most existing research on digital learning in EFL contexts has primarily focused on traditional classroom-based instruction and less attention has been paid to social media platforms. The present study aims to fill the gap by using social semiotics to analyze four Instagram posts: two from BBC Learning English (@bbclearningenglish) and the other two from Learn English with Emma (@englishwithemma). Instagram posts are classified as multimodal texts with participatory and representational elements. The study adopts Kress and van Leeuwen’s (2005) Social Semiotic Multimodal Framework to analyze four purposely selected posters by answering the following research questions
... Show More