The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.
Complexes of some metal ions with 2-thiotolylurea were prepared in ethanolic medium using (1:1) (Metal : Ligand) ratio yielded series of neutral complexes as the general formula [M(L)Cl2]. The prepared complexes were identified by atomic absorption FT.IR, UV-Visble spectra, molar conductivity and magnetic properties. From the above data the tetrahedral structure was suggested for all complexes.
In this research, new series of Furo-2-quinolone [FQ] compounds have been synthesized. These novel [FQ] compounds were prepared from coumarin derivatives (Furocoumarins: psoralen and isopsoralen).Identifications of these FQ compounds were performed by using infrared spectrum (I.R), Ultraviolet spectrum (U.V) and Nuclear Magnetic Resonance spectrum (H1-NMR) besides some physical data. The cytotoxic screening involves ;using HEP-2 cell line which gave differential responses against tested compounds : 4,6 Dimethyl furo[2, 3-g] coumarin (C1), 1-(2`, 4`, Dimethoxy benzylideneimino)-2,6-dimethyl Furo [2, 3-g] quinoline-2-one (C3) and the angular psoralen of the same derivative
... Show MoreIn this work 2-mercaptobenzoxazole (2-MBO) (1), was prepared by using homemade Auto clave .The synthesis involve treatment of 2-MBO with 2-chloro acetyl chloride to give 2-chloroacetyl thio benzoxazole (2), the product was treated with phenyl hydrazine to give 2-phenyl hydrazide acetyl thio benzoxazole (3). The new derivatives (4-13) were synthesized by reaction of 2-phenyl hydrazide acetyl thio benzoxazole (3) with different aromatic aldehydes in the presence of acetic acid. The compound (2) was treated with hydrazine hydrate to give product (14) then treated with different aromatic aldehydes in the presence of glacial acetic acid to give Schiff bases derivatives (15-24). Structure of all the prepared compounds confirmation were proved
... Show MoreNew series of 2-mecapto benzoxazole derivatives (1-20) incorporated into fused to different nitrogen and suphur containing heterocyclic were prepared from 2-meracpto benzoxazole, when treated with hydrazine hydrate to afford 2-hydrazino benzoxazol (1). Compound (1) converted to a variety of pyridazinone andphthalazinone derivatives (2-4) by reaction with different carboxylic anhydride. Also, reaction of (1) with phenyl isothiocyanate and ethyl chloro acetate afforded 3-phenyl-1,3-thiazolidin-2,4-dione-2-(benzoxazole-2-yl-hydrazone) (6). Azomethines (7-10) were prepared through reaction of (1) with aromatic aldehyde, then (7, 8) converted to thaizolidinone derivatives (11, 12). Treatment of (1) with active methylene compounds afforded deriva
... Show More1,3-0xazepine-4)-diones were prepared by c.ondensation of NÂ
cinnamylideneareneamines with maleic anhydride, phthalic;; anhydride
,and 3-nitrophthalic anhydride. The oxazepjne::; were reacted with
primary aromatic amine to give the corresponding 1 ,3--diazepine-4,7- diones.
Was appointed acid steady disintegration of organic EkandThe results proved that organic Allicand acting and Konnh solid baseBy Tgrav Pearson has possible account Maamat hardness and softness of organic Ekand
Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreLately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show More