This work deals with kinetics and chemical equilibrium studies of esterification reaction of ethanol with acetic acid. The esterification reaction was catalyzed by an acidic ion exchange resin (Amberlyst- 15) using a batch stirred tank reactor. The pseudo-homogenous and Eley-Rideal models were successfully fitted with experimental data. At first, Eley-Rideal model was examined for heterogeneous esterification of acetic acid and ethanol. The pseudo-homogenous model was investigated with a power-law model. The apparent reaction order was determined to be (0.88) for Ethanol and (0.92) for acetic acid with a correlation coefficient (R2) of 0.981 and 0.988, respectively. The reaction order was determined to be 4.1087x10-3 L0.8/(mol0.8.min) with R2 of 0.954. The adsorption constants of acetic acid and ethanol were calculated as 0.023 and 0.044 L/mol, respectively and the lumped reaction constant were determined to be 5*10-4 L2/gcat.mol.min. The results of the reaction kinetic study show that the high acetic acid/ethanol molar ratio was favored. The maximum conversion of 70 % was obtained at 70°C for acetic acid/ethanol molar ratio of 4.
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The aim of this paper is to present a method for solving of system of first order initial value problems of ordinary differential equation by a semi-analytic technique with constructing polynomial solutions for decreasing dangers of lead. The original problem is concerned using two-point osculatory interpolation with the fit equals numbers of derivatives at the end points of an interval [0 , 1].
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe new sustainable development goals set by the UN include a goal of making cities inclusive, safe, sustainable, and resilient. Cities are growing at huge rates, and conditions of deteriorating QOL̛s are increasing in the form of poor access to services, and slums are remarkable, especially in the cities of the Middle East; hence, the research problem can arise from a lack of knowledge regarding the in determination of a way to assess the resilience of cities to develop mechanisms that will improve the quality of urban life. In this study, a tool called CRF has been applied for the assessment of the city's resilience principles of health and quality of life, economics and social, infrastructure and environmental systems, and the principle
... Show MoreThe agriculture around the world faced many difficulties and the important was to reduce inputs of chemical fertilizers and pesticides and increase the total yield specially with the continuous grow of populations numbers at the world expected to reach more than 9 billion by 2050. In other hand there are other problems which make the challenges bigger such as wars, biotic and abiotic stress, and diseases. The scientists tried to find solutions by using Nano-fertilization which consider a modern way to quickly grow up the yield and decrease use the chemicals. The use of nanotechnology may be destructive on human and the environment due to fast accumulation in the tissues of alive bodie
The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More