In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tracked frequencies was chosen to be the most occurred frequencies in the power spectrum. Several sizes of the overlap windows have been tested to study the effect of window size on the accuracy of the determined radial velocity of the moving airplane.
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreThis study includes analytical methods for the determination of the drug amoxicillin trihydrate (Amox.) in some pharmaceutical preparations using Cobalt ion (Co(II)) as complexing metal. The best conditions for complexation were: the reaction time was 20 minutes, pH=1.5 and the best temperature of reaction was 70 ËšC. Benzyl alcohol was the best solvent for extraction the complex.
Keywords: Amoxicillin, Cobalt(II), Complex, Molar ratio.
Most of the known cases of strong gravitational lensing involve multiple imaging of an active galactic nucleus. The properties of lensed active galactic nuclei make them promising systems for astrophysical applications of gravitational lensing. So we present a simple model for strong lensing in the gravitational lensed systems to calculate the age of four lensed galaxies, in the present work we take the freedman models with (k curvature index =0) Euclidian case, and the result show a good agreement with the other models.
Background: Gray-scale sonography is generally
considered as a first-line diagnostic tool for patient with
suspected acute cholecystitis. It is suggested by gallstones,
Murphy's sign, thickening of the gallbladder wall and bile
sludging, but the specificity of these sonographic findings
are not as high as their sensitivity. Blood flow of the
gallbladder wall is increased in acute inflammation.
Objective: To evaluate the sensitivity and specificity of
power Doppler sonography and compared with conventional
color Doppler and gray-scale sonography in diagnosing
patients with acute cholecystitis.
Type of the study: This was a cross sectional study.
Patients and methods: The study was conducted t
In past years, structural pavement solution has been combined with destructive testing; these destructive methods are being replaced by non-destructive testing methods (NDT). Because the destructive test causes damage due to coring conducted for testing and also the difficulty of adequately repairing the core position in the field. Ultrasonic pulse velocity was used to evaluate the strength and volumetric properties of asphalt concrete, of binder course. The impact of moisture damage and testing temperature on pulse velocity has also been studied. Data were analyzed and modeled. It was found that using non-destructive testing represented by pulse velocity could be useful to predict the quality of asphalt c
... Show MoreA simple, cheap, fast, accurate, Safety and sensitive spectrophotometric method for the determination of sulfamethaxazole (SFMx), in pure form and pharmaceutical dosage forms. has been described The Method is based on the diazotization of the drug by sodium nitrite in acidic medium at 5Cº followed by coupling with salbutamol sulphate (SBS) drug to form orange color the product was stabilized and measured at 452 nm Beer’s law is obeyed in the concentration range of 2.5-87.5 ?g ml-1 with molar absorptivity of 2.5x104 L mole-1 cm-1. All variables including the reagent concentration, reaction time, color stability period, and sulfamethaxazole /salbutamol ratio were studied in order to optimize the reaction conditions. No interferences were
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More