The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
This study describes preparation a new series of tetra-dentate N2O2 dinuclear complexes Cr(III), Co(II)and Cu(II) of the Schiff base 2-[5-(2-hydroxy-phenyl)-1,3,4-thiadiazol-2-ylimino]-methyl-naphthalen-1-ol], (LH2) derived from 1-hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. These ligands were characterized by FT-IR, UV-Vis, Mass spectra, elemental analysis, and 1H-NMR. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, thermal Analysis (TGA), and metal analysis by atomic absorption. The stoichiometry of metal to ligand, magnetic susceptibility, and electronic spectra measurements show an octahedral geom
... Show MoreNew ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures. Keywords: pyrimidin-2-amine, acetyl isothiocyanate, complexes, Antimicrobial activity
New ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures
synthesis and characterization of New Bidentate schiff base Ligand Type(NO)Donor Atoms Derived from isatin and 3-Amino benzoic acid and Its complexes with Co(||),Cu(||),Cd(||)and Hg(||)Ions
In linear regression, an outlier is an observation with large residual. In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.
An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.
Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a
... Show MoreLoanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreExtraction of copper (Cu) from aqueous solution utilizing Liquid Membrane technology (LM) is more effective than precipitation method that forms sludge and must be disposed of in landfills. In this work, we have formulated a liquid surfactant membrane (LSM) that uses kerosene oil as the main diluent of LSM to remove copper ions from the aqueous waste solution through di- (2-ethylhexyl) phosphoric acid - D2EHPA- as a carrier. This technique displays several advantages including one-stage extraction and stripping process, simple operation, low energy requirement, and. In this study, the LSM process was used to transport Cu (II) ions from the feed phase to the stripping phase, which was prepared, using H2SO4. For LSM p
... Show More