As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree of protection to secure personal user transactions by creating secure keys that can be used for insecure channels.
The proton, neutron and matter density distributions, the corresponding size radii and elastic electron scattering form factors of one-proton8B and two-proton 17Ne halo nuclei are calculated. The theoretical technique used to fulfill calculations is by assuming that both nuclei under study are composed of two main parts; the first is the compact core and the second is the unstable halo part. The single-particle radial wavefunctions of harmonic-oscillator (HO) and Woods-Saxon (WS) potentials are used to study core and halo parts, respectively. And other approach is studied by using HO potential for both core and halo parts, but using two HO size parameters for both supposed parts. The long ta
... Show MoreThe preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.
The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.
Sixteenth formulae of SPH h
... Show MoreAssociation of Electrocardiographic Left Ventricular Strain Pattern with Coronary Artery Disease and Cerebrovascular Accident in Hypertensive Patients
Background: Patients diagnosed with hypertension and left ventricular hypertrophy could presented with electrocardiographic changes including criteria of left ventricular hypertrophy, and left ventricular strain pattern( fixed ST depression and T inversion in leads I, avL, V5&6)
Objective: To study the impact of electrocardiographic left ventricular strain pattern in hypertensive patient as predictor for coronary artery disease and cerebrovascular accident development.
Material and method: a cro
... Show More
The aim of this research is to identify the Andalusia poet Abu Izac Al-Zauali , whose most of his poetry and biography had been lost, as well as many Andalusia poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry and to document his poetry as other writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .
Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).
Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id
... Show MoreIn this paper, we introduce and study the notation of approximaitly quasi-primary submodules of a unitary left -module over a commutative ring with identity. This concept is a generalization of prime and primary submodules, where a proper submodule of an -module is called an approximaitly quasi-primary (for short App-qp) submodule of , if , for , , implies that either or , for some . Many basic properties, examples and characterizations of this concept are introduced.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreWater harvesting techniques developed globally during the last decades with highly increasing water crisis and climate changes. The Yeoman keyline method was spread widely with increased use for sustainable permaculture development. The main aim of the current study is to analyze and solve the siltation problem in Dwerige weir and to develop water resources in the basin area. The remote sensing data, field surveying, and hydrology are used together to build a new geotechnical approach. The results show that a huge siltation quantity was not considered in the weir design studies, which were represented by sand sheet materials and eroded soils washed by flooding and entering the weir reservoir through four main channels. The t
... Show More