The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wireless temperature sensor, which utilizes proton resonance frequency of carbon-13 isotope material. In addition to that, this study also addresses the energy distribution of the particles by selecting an updated appropriate approach that has interesting points of limitation in the number of degree of freedom: (1) thermodynamically limits and (2) theoretical statistical thermodynamics observations. Lastly, the main idea of this paper is to visualize the analysis of temperate in the nanoscale system via statistical thermodynamics approach along with the material characterization of carbon-13 isotope.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreTwo new ligands Na2[ H3B (BDIA)].0.05H2O (L1)(BDIA = 1-Boranyl-2,3-
Dihydro-1H-Indol-3-yl)]Acetic Acid and Na3[H2B(BDIA)2].0.3H2O.0.3CH3Ph (L2)
were synthesized by reaction of NaBH4 with indole -3- acetic acid (IAA) . The
coordination properties of ligands were studied with Co(II) , Ni(II) , Cu(II) and
Pt(IV) ions. Characterization and structural aspects of the prepared compounds were
elucidated by 1HNMR, FTIR electronic spectra, magnetic susceptibility, elemental
and metal analysis, thermal analysis (TG & DTG) and conductivity measurements.
The obtained data for metal complexes suggested square planar geometry for
copper complexes, octahedral geometry for nickel and platinium complexes and
tetrahedral geom
ABSTRACT. A new three metal complexes of La(III), Ce(IV) and UO2(II) ions have been synthesized based on a Schiff base derived from the condensation of L-histidine and anisaldehyde. All prepared compounds were characterized by different spectroscopic techniques and Density-functional theory (DFT) calculations. The complexes were proposed to have an octahedral structure based on the investigated results. The optimized shape, numbering system, and dipole moment vector of Ligand and La, Ce, and UO2 (1:1) chelates were investigated. The Schiff base ligand and complexes exhibit moderate action against all of the bacteria tested, with P. aeruginosa, Klebsiella sp., and E. faecalis respectively being the order of inhibition.
... Show MoreUrban Development refers to many topics such as: increased population density, city size, and individual’s production, distribution of technology and the growth of commercial, industrial and service professions. Such development is linked to the coordination of social and cultural trends in order to achieve social progress and economical prosperity. Knowledge as a topic now is known as intellectual capital wich led to upgrae the concept of urban development to be extended into many fields of knowledge, for example, cultural, social and human development to move the level of community culture into a new better standard.
The research adopted the urban transformation based on knowledge as an important factor in gr
... Show More
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More