The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is responsible for maintaining the authenticity of the blocks’ wallets throughout any transaction related to any block of the blockchain. This framework can be used for a wide range of applications such as student registration systems at universities: in order to prevent the forging of student graduation certificates. The experimental results demonstrated robustness of the proposed solution, using a number of key sizes. The effectiveness of our approach is compared to that of elliptic curve cryptography keys. Our approach shows that the security and authentication needed for blockchain technology can be accomplished using DNA combined with an RSA private key. On the other hand, the standard EC cryptography shows poor performance against our suggested method as demonstrated in the discussion section.
This paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.
Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlatio
... Show MoreIn this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adsor
... Show MoreDeep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme
... Show MoreWhen images are customized to identify changes that have occurred using techniques such as spectral signature, which can be used to extract features, they can be of great value. In this paper, it was proposed to use the spectral signature to extract information from satellite images and then classify them into four categories. Here it is based on a set of data from the Kaggle satellite imagery website that represents different categories such as clouds, deserts, water, and green areas. After preprocessing these images, the data is transformed into a spectral signature using the Fast Fourier Transform (FFT) algorithm. Then the data of each image is reduced by selecting the top 20 features and transforming them from a two-dimensiona
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show Moreنقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين. كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا (1974- 1899) يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مست
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreHealth and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreA new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio
... Show More