A variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreSchiff Base And Ligand Metal Complexes of Some Amino Acids and Drug
Acidity constants at 30co and 0.125 ionic strength have been determined for the Nitrogous bases of nucleic acid; cytocine, uarcil and thymine, and found to be 3.55 x10-19 , 1.44 x10 -19 and 7.24 x10 -20 respectively. Stability constants of these bases with Thorium and uranyl ions have been determined. Results showed that metal ions Thorium and uranyl ions behave as hard acids and the nitrogenum bases behave as Hard bases according to Pearson's definition .Hardness – softness parameters for these ligands were calculated ,stability constants of complexes with metal ions could be arranged as follows :- Cytosine > Uracil > Thymine .
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreMixed ligands reaction of [2-[(3-hydroxyphenyl)diazinyl]-1,2-benzothiazol-3(2H)-one-1,1-dioxide] (H2L, primary ligand) and bipyridyl (secondary ligand) with salts of Cr(III), Mn(II), Fe(III), Co(II) and Ni(II) was performed. A series of air-stable complexes with distinctive octahedral moieties was created by equal molar ratio (1:1:1). The formation of these compounds was verified using detecting analysis techniques incorporating mass spectra, which validated the achieved geometries. Fourier transform infrared (FTIR) analysis demonstrated how the ligands (H2L and bipyridyl) are chelated as tridentate (ONO) and bidentate (NN) groups, respectively and the coordination with the metal ions. Thermal decomposition studies using pyrolysis (
... Show Moreحضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال
... Show MoreThe research tacklets the role of risks arising from the excessive use of derivative contracts for trading in financial crises, including the recent global financial crisis in (2008) which is known the mortgage crisis.
In order to prove the hypothesis of the research, the risk index of derivative contracts has been chosed as expressed in the measure of (value at risk) to be the main field for testing the hypothesis of research. The duration of the contract has been also chased for (15) years between the years (2001- 2015), the period preceding the global financial crisis, while the second represents the period of time that followed. The research reached a number of conclusions, bu
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show More