The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
A rapid, simple and sensitive spectrophotometric method for the determination of trace amounts of chromium is studied. The method is based on the interaction of chromium with indigo carmine dye in acidic medium and the presence of oxalates as a catalyst for interaction, and after studying the absorption spectrum of the solution resulting observed decrease in the intensity of the absorption. As happened (Bleaching) for color dye, this palace and directly proportional to the chromium (VI) amount was measured intensity of the absorption versus solution was figurehead at a wavelength of 610 nm. A plot of absorbance with chromium (VI) concentration gives a straight line indicating that Beer’s law has been obeyed over the range of 0.5
... Show MoreA joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get
... Show MoreThis investigation aimed to explain the mechanism of MFCA by applying this method on air-cooled engine factory which was suffering from high production cost. The results of this study revealed that MFCA is a useful tool to identify losses and inefficiencies of the production process. It is found that the factory is suffering from high losses due to material energy and system losses. In conclusion, it is calculated that system losses are the highest among all the losses due to inefficient use of available production capacity.
The present study aims to remove nickel ions from solution of the simulated wastewater using (Laminaria saccharina) algae as a biosorbent material. Effects of experimental parameters such as temperature at (20 - 40) C⁰, pH at (3 - 7) at time (10 - 120) min on the removal efficiency were studied.
Box-Wilson method was adopted to obtain a relationship between the above three experimental parameters and removal percentage of the nickel ions. The experimental data were fitted to second order polynomial model, and the optimum conditions for the removal process of nickel ions were obtained.
The highest removal percentage of nickel ions obtained was 98.8 %, at best operating conditions (Temperature 35 C⁰, pH 5 and Time 10 min).
The performance of a batch undivided electrochemical reactor with a rotating cylinder electrode of woven-wire (60 mesh size), stainless steel 316, is examined for the removal of copper from synthetic solution of o.5 M sodium chloride containing 125 ppm at pH ≈ 3.5. The effect of total applied current, rotation speed on the figures of merit of the reactor is analyzed. For an applied current of 300 mA at 100 rpm, the copper concentration decreased from 125 to mg l-1 after 60 min of electrolysis with a specific energy consumption of 1.75 kWh kg-1 and a normalized space velocity of 1.62 h-1. The change in concentration was higher when the total applied currents were increased because of the turbulence
... Show MoreIn cognitive radio system, the spectrum sensing has a major challenge in needing a sensing method, which has a high detection capability with reduced complexity. In this paper, a low-cost hybrid spectrum sensing method with an optimized detection performance based on energy and cyclostationary detectors is proposed. The method is designed such that at high signal-to-noise ratio SNR values, energy detector is used alone to perform the detection. At low SNR values, cyclostationary detector with reduced complexity may be employed to support the accurate detection. The complexity reduction is done in two ways: through reducing the number of sensing samples used in the autocorrelation process in the time domain and through using the Slid
... Show MoreMobile phones are widely used nowadays, for different application such as wireless control and monitoring due to its availability and ease of use. The implemented system is based on "global system mobile (GSM)" network by using "short message service (SMS)". The design mainly contains a GSM modem and interfacing unit circuit with microcontrollers. This system could control up to eight different electrical devices such as light, Air conditioner, washing machine and many more applications which needed in daily life in different area (House, Office, or factory, etc.). The control is done by sending a specific SMS messages from traditional or smart phone. The controlling devices are restricted to a pre-defined phone number and are set in the so
... Show MoreThe main purpose of this work is the construction of an optical parametric amplifier (OPA) to generate a 629 nm pulsed laser. KTP nonlinear crystals were used for both parametric oscillation and amplification. A singly resonant parametric oscillator (OPO) is constructed to generate a signal of 1.54 μm and idler of 3.4 μm when the OPO system is pumped by 1.064 μm Q – switched Nd: YAG laser. The signal was then mixed with the pumping beam in OPA system to form the wanted wavelength. The obtained optical conversion efficiency was 60%.
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show More