This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
Baluti Formation of the Rhaetian (Late Triassic) age is composed mainly of dolomite, the unit formed with dolomitic limestone, dolomitic breccias and limestone begins with gray or dark gray colored and sugar textured dolomitic limestones including micrite with shale horizons. Baluti Formation was deposited in carbonate platform, and slumped to deeper margins forming carbonate debrites and breccias of various types.
Petrographic examination of the dolomites reveals various crystal habits and textures of the dolomites. Planktonic bivalve, calcisphere and echinoid spicules were found in the Baluti Formation settled in deep-margin carbonate environment. Nine dolomite-rock textures were identified and classified according to the crystal-si
The symmetrical N,N‾-Bis-(4-methyl phenyl) pyromellitamic diacid (I) was synthesized from the reaction of toludine with pyromellitic dianhydride in dry acetone. Esterification of amic acid (I) with dimethyl sulphate in basic medium using acetone as a solvent give symmetrical N,N‾-bis-( 4- methyl phenyl ) pyromellitam diacetate (II). The condensation of new ester with hydrazine hydrate in ethanol leads to the formation symmetrical N,N‾-bis- (4-methyl phenyl) pyromellitamic hydrazide (III). New symmetrical 1,3-oxazepine derivatives (V)a-e can be synthesized from the reaction of the new synthesized Schiff bases (III)a-e (which are synthesized from the reaction new hydrazide
... Show MoreThis work deals with preparation of Sulfated Zirconia catalyst (SZ) for isomerization of n-hexane model and refinery light naphtha, as well as enhanced the role of promoters to get the target with the mild condition, stability, and to prevent formation of coke precursors on strong acidic sites of the catalyst. The prepared SZ catalysts were characterization by fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), Brunauer –Emmett-Teller (BET) surface area analysis, Thermogravimetric Analysis (TGA), Scanning Electron Microscope (SEM) and atomic force microscopy (AFM) Analyzer. The results illustrate that the maximum conversion and selectivity for n-hexane isomerization with Ni-WSZ and operating temperature of 150 °C
... Show MorePolyimides are widely used in high-temperature plastics, adhesives, dielectrics, photoresists, nonlinear optical materials, separation membrane materials, and Langmuir-Blodgett (LB) films. They are commonly regarded as the most heat-resistant polymers. This work involved the synthesis of a new bismaleimide homopolymer and copolymer by performing many steps. The synthesis of compound (1) (bis [4-(amino phenyl) Schiff base] tolidine) via condensation of o-tolidine with two moles of 4-aminoacetophenone. Secondly, compound (1) was combined with maleic anhydride to form compound (2) (4, 4ˉ-bis[4-(N-maleamic acid) phenyl Schiff base] toluidine). Thirdly, a dehydration reaction was carried out affording compound (3) (4,4ˉ-bis [4-(N-maleimidyl
... Show MoreLet be any group with identity element (e) . A subgroup intersection graph of a subset is the Graph with V ( ) = - e and two separate peaks c and d contiguous for c and d if and only if , Where is a Periodic subset of resulting from . We find some topological indicators in this paper and Multi-border (Hosoya and Schultz) of , where , is aprime number.
Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreThe plant Zizyphus spina-christa grows wildly in the middle and southern of Iraq locally named Nabag. In this study the antibacterial activity of several different plant extract (alcoholic hot and cold extract 80%, aqueous hot and cold extract) was tested against some gram negative bacteria that related to Enterobacteriacea as follow; Pseudomonas aeruginosa, Escherchia coli Proteus mirabilis, Serratia mercesence,. Aeromonas sp, Klebsiella pneumoniae ,Shigella sp, Salmonella enteritidis (134), S. typhi(97), S. typhimurium (300) , S. typhi, . The results showed that efficient method of extract was alcoholic hot extract from other extract methods that are used in this study. The detection of active compound in crude extracts of the leaves show
... Show More