Preferred Language
Articles
/
CBajHooBVTCNdQwCmJE8
Carbon-13 Characterization and Modelling for Temperature Measurement-Based Proton Frequency
...Show More Authors

The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wireless temperature sensor, which utilizes proton resonance frequency of carbon-13 isotope material. In addition to that, this study also addresses the energy distribution of the particles by selecting an updated appropriate approach that has interesting points of limitation in the number of degree of freedom: (1) thermodynamically limits and (2) theoretical statistical thermodynamics observations. Lastly, the main idea of this paper is to visualize the analysis of temperate in the nanoscale system via statistical thermodynamics approach along with the material characterization of carbon-13 isotope.

Scopus Crossref
View Publication
Publication Date
Thu Aug 01 2013
Journal Name
Ibn Al- Haitham Journal For Pure And Applied Science
Synthesis and Characterization of Heterocyclic Compounds Derived From 4- Hydroxy and 4-Amino Acetophenone
...Show More Authors

Two series of Schiff Bases [VI]n and thiazolidin-4-one derivatives[VII]n were synthesized by many steps starting from cyclization of 4- hydroxyacetophenon with thiourea in iodine to yield 1,3-thiazole compound which was reacted with pentoxy bromide in anhydrous potassium carbonate to converted compound[II] and this reacted with Phenol to yield azo compound[III]. The azo compound reacted with ethyl chloro acetate in basic medium to get a new easter compound[IV] which is converted to their acid hydrazid[V]. The later compound condensation with n-alkoxy benzaldehyde to give new Schiff bases[VI]n . Imine group undergoes addition cyclization with thioglycolic acid to get thiazolidinone compounds[VII]n .Also, two new series of Schiff Bases [XII]n

... Show More
Publication Date
Thu Aug 15 2013
Journal Name
Journal Of The College Of Basic Education
Synthesis and Characterization Mixed Ligands of Phenylalanine and Tributylphosphine Complexes with Selected Metal Ions.
...Show More Authors

Complexes of Co(II),Ni(II),Cu(II) and Zn(II) with mixed ligands of phenylalanine (L) and tributylphosphine (TBPh) were prepared in aqueous ethanol with (2:1:1) (M:L:TBPh). The prepared complexes were characterized using flame atomic absorption,(C.H.N)Analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. In addition biological activity of the phenylalanine and complexes against two selected type of bacteria were also examined. Some of the complexes exhibit good bacterial activities. From the obtained data the octahedral structure was suggested for all prepared complexes.

Publication Date
Tue Aug 30 2022
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
Synthesis and characterization of benzil crown cyclic Schiff base ligand and its metal complexes
...Show More Authors

ABSTRACT. The reaction between benzil and hexamethylenediamine formed a new ligand [L], [(1Z,3Z)-2,3-diphenyl-5,6,7,8,9,10-hexahydro-1,4-diazecine], of the type [N2], was synthesized by the condensation reaction through Schiff base reaction between benzil and hexamethylenediamine. The new Schiff base ligand reacts with Mnп, Niп and Coп metal ions to give the complexes with the general formula: [M(L)Cl2]. The elemental investigations have been used to analyze the ligand and its complexes by CHN, FT-IR, UV-Vis, TLC, mass spectrum, melting point with the study of biological activity to the formed compounds. From the data obtained, the proposed molecular structure adopts square planar structure about the metal ions. The study reveals

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 03 2013
Journal Name
Eur. Chem. Bull
PREPARATION AND CHARACTERIZATION OF UNSATURATED POLYESTER MATERIAL BLENDED WITH CELLULOSE AND WITH ETHYL CELLULOSE.
...Show More Authors

Modified unsaturated polyester (MUPE) was blended with Cellulose (Cls) and with ethyl cellulose (ECls) at ambient conditions in the presence of ethyl methyl ketone peroxide (EMKP) as hardener. The blends containing different weight percentages (5-25 %) of Cls or ECls. Mechanical properties (impact strength, hardness, and bending) and dielectric constant were determined. The results observed that Cls increases the impact strength, hardness, and dielectric constant and decreases the bending of the MUPS, while ECls causes an increase in the three mechanical behaviours and a decrease in the dielectric constant of the MU-PS.

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Apr 18 2013
Journal Name
International Journal Of Computer Applications
Design and Simulation of Hartley based Multi Orthogonal Band OFDM
...Show More Authors

Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref