The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.
In the present paper we report the synthesis of a new ligand [HL][(2-1-[(2-hydroxy-benzylidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol and its complexes with (Mn", Fe", Cd", and Hg") The ligand was prepared in two steps. In the first step a solution of salicylaldehyed in methanol reacted under reflux with hydrazinemonohydrate to give an intermediate compound which reacted in the second step with 2, 4, 6-trihydroxidernonohydrate giving the tientioned ligand. The complexes were synthesis by direct reaction of the corresponding metal chloride with ligand. The ligand and the complexes have been characterized by spectroscopic methods [" H NMR, IR, UV-Vis,, atomic absorption], HPLC microanalysis along with conductivity measurements. From the abo
... Show MoreThe genera and species of Liliaceae show a considerable structural diversity of leaves and especially stems. This paper presents a morphological and anatomical study of the leaves and stems of Asphodelus microcarpus. The results showed that the investigated species had typical morphological characters. and also that it could be distinguished from another plant not only by its morphological but anatomical characters as well.
F index is a connected graph, sum of the cubes of the vertex degrees. The forgotten topological index has been designed to be employed in the examination of drug molecular structures, which is extremely useful for pharmaceutical and medical experts in understanding the biological activities. Among all the topological indices, the forgotten index is based on degree connectivity on bonds. This paper characterized the forgotten index of union of graphs, join graphs, limits on trees and its complements, and accuracy is measured. Co-index values are analyzed for the various molecular structure of chemical compounds
The polyaniline powder was chemically manufactured by direct oxidation of aniline. The resulting polymer was characterized by the results of optical, measurements by (FT-IR) spectroscopy, we have detected some of the absorption peaks located at 3498, 2858 cm-1, which correspond N-H vibrations, and C-H expansion of the aromatic ring respectively as well as stretching vibrations of quinoid ring have been observed. Structural properties, such as the surface topography using an atomic force microscope (AFM), and Surface composition by (SEM) have been studied. The structure of some pellets of polyaniline powder have been examined by using analytical X-ray diffraction technique, the pattern of obse
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreIn developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreThe determination of critical micelle concentration of selected non-ionic surfactants (Tween 20,40 and 80) have been investigated using magnetic water(MW)as an aqueous medium.Conductometry technique is used to determine critical micelle concentration.The effect of alcohol addition and temperature variation at the range(293.15 -303.15K) are also pursued. It is concluded that the process of micellization is spontaneous and endothermic because of the observed free energy of micellization (ΔGom) , enthalpy change of micellization (ΔHom), and entropy change of micellization (ΔSom) for the system was also studied.The properties of the non-ionic surfactants were studied, both in absence and presence of
... Show More