The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Mixed ligand complexes of bivalent metal ions, viz; M= Fe(II),Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition Na2[M (Amox)(Sac)3] in 1:1:3 molar ratio, (where Amox = Amoxicillin tryhydrate (C16H19N3O5S.H2O) and Sac = Saccharine(C7H5NO3S) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity, determination the percentage of the metal in the complexes by flame(AAS), FT-IR, magnetic susceptibility measurements and electronic spectral data. The ligands and their metal complexes have been screened for their biological activity against selected microbial strains (gram +ve) and (gram -ve).
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreIn this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show More