The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.
Precision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show More2-amino-5-mercapto-1,3,4-thiadiazole [I] were prepared by the cyclization of thiosemecarbazide with carbon disulphide and anhydrous sodium carbonate in ethanol as a solvent. The reaction of compound [I] with alkyl halides yielded 2- amino-5-thioalkyl-1,3,4- thiadiazole [II] and [III] . Compound [II] and [III] were reacted with different aromatic aldehydes to yieled 2-[(substituted benzyliden ) amino] -5- thioalkyl-1,3,4- thiadiazole [IV]a-c , [V]a-d and [VI]a-d . Schiff ,s bases [IV]a-c , [V]a-d and [VI]a-d were found to react with 2mercapto benzoic acid in the triethyl amine to give 3-[ 5-( alkylthio) -1,3,4- thiadiazol-2-yl] 2,3- dihydro- 2- (aryl) benzo [e] [1,3] thiazine -4-one [VII]a-
... Show MoreThis research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide)
... Show MoreNew 2-Mercaptobenzimidazole derivatives were synthesized. 4,5-disubsitituted 1,2,4-Triazole compounds 1b-2c were synthesized from 2-(benzylthio) benzimidazole compound a, which was then reacted with (NaH) in dioxane at a temperature of (0-5 C°) to produce the salt of compound a. Then the salt was reacted with ethyl chloro acetate to yield Ethyl 2-(benzylthio) benzimidazole acetate compound b. Compound b was converted to triazole derivatives by two pathways. The first pathway was reacting compound b with semicarbazide, thiosemicarbazide and phenylsemicarbazide in DMSO as a solvent to gain compounds 1b-3b, which were then
... Show MoreIn our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreA new furfural Schiff base derivative ligand (L-FSB) named N-(4- Bromo-2-methylphenyl)-1-(furan-2-yl)methanimine, was synthesized from the condensation reaction of furfural (fur) with 4-Bromo-2- methylaniline (bma) in 1:1molar ratio. A new series of VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II) metal complexes are synthesized according to the metal content analysis in an 2:1 ligand:metal ratio. The stereochemistry of the ligand complexes have been deduced by Fourier Transform-Infra Red (FT-IR), Atomic Adsorption (A.A), Ultra violate-Visible Spectra (UV-Vis Spectra), (Mass Spectra, Proton,13Carbon-Nuclear Magnetic Resonance) (1H-NMR,13CNMR) for ligand), magnetic susceptibility at 25oC and conductivity measurements. Fr
... Show MoreDesign and synthesis of novel poly heterocycles together using same heterocyclic compound is the main task of the present paper. The target compounds entitled 4,4’-[benzene-1,4-diylbis[ethylidenehydrazine-2-ylidene]bis[4-[3,5-di(5-substitutedpyridin-2-yl)-3,3a-dihydro[1,3]thiazolo[4,5-c][1,2]oxazol-6(5H)-yl]-4H-3-yl-1,2,4-triazole-3-thiol] have been synthesized starting from the reaction of 1,4-diacetylphenyl and carbohydrazide to give Schiff base derivatives then 1,2,4- triazole derivatives from the reaction with CS2 and an excess of hydrazine hydrate. The same applies for the condensing of these newly heterocyclic amines with different pyridine-2-carbaldehydes, which resulted in the synthesis of some new Schiff bases, whic
... Show More