With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreIn this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreIn the present work, the nuclear shell model with Hartree–Fock (HF) calculations have been used to investigate the nuclear structure of 24Mg nucleus. Particularly, elastic and inelastic electron scattering form factors and transition probabilities have been calculated for low-lying positive and negative states. The sd and sdpf shell model spaces have been used to calculate the one-body density matrix elements (OBDM) for positive and negative parity states respectively. Skyrme-Hartree-Fock (SHF) with different parameterizations has been tested with shell model calculation as a single particle potential for reproducing the experimental data along with a harmonic oscillator (HO) and Woods-Saxo
... Show MoreGrammatical particles are so important in understanding a text and its meaning in linguistic context. This paper " Grammatical Behavior and Uses of Negative and Prohibitive Particles in Semitic Languages: A Comparative Semitic Study"
tackles a very important topic in Semitic languages. Comparative studies in Semitic languages shed light on phenomena in different languages that are related or have one common origin. No doubt, such studies have their own effects on language study in general especially when studying a specific phenomenon and explaining it by reliance on the one origin, or by investigating the various phases of its historical development.
... Show MoreThe present work establishes and validates HILIC strategies simple, accurate, exact and precise in pure form and inpharmaceutical dosage for separating and determining theophylline. These methods are developed on HILIC theophyllineseparation in columns ZIC2 and ZIC3. The eluent was prepared by mixing buffer (20% sodium acetate-40 mM, pH 5.5), 80%acetonitrile. The flow rate is 0.8 mL/min, with gradient elution and UV detection at 270 nm. In the ZIC2 and ZIC3 columns oftheophylline determining, the concentration range was 0.01-4μg.ml-1. The lower limit of detection and quantification fortheophylline were determined as 0.130, 0.190 μg.ml-1 and accuracy were 99.70%, 99.58% on ZIC2 and ZIC3, respectively. TheHILIC methods developed and validat
... Show MoreBackground: Adenoiditis is a common cause of otitis media with effusion (OME) in children & perhaps OME is one of the most common diseases leads to hearing impairment in children with subsequent impairment of speech development & learning difficulties , however, treatment remains controversial. Objectives: To evaluate if there is a significant advantage of tympanostomy tube insertion in association with adenoidectomy over adenoidectomy in association with myringotomy alone in treatment of children with OMEType of the study: This is a prospective study. Patients & methods: The study consisted from 63 children diagnosed as cases of bilateral OME & variable degrees of adenoid hypertrophy. The patients were divided randomly i
... Show More