The synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
The main objective of this research is to find the coefficient of permeability (k) of the soil and especially clayey soil by finding the degree of consolidation (rate of consolidation). New modify procedure is proposed by using the odometer (consolidation) device. The ordinary conventional permeability test usually takes a long time by preparing and by testing and this could cause some problems especially if there is a need to do a large number of this test and there were a limited number of technicians and/or apparatus. From this point of view the importance of this research is clear, since the modified procedure will require a time of 25 minute only. Derivation made to produce an equation which could be used to fined the permeabi
... Show MoreAs is known that the consumer price index (CPI) is one of the most important price indices because of its direct effect on the welfare of the individual and his living.
We have been address the problem of Strongly seasonal commodities in calculating (CPI) and identifying some of the solution.
We have used an actual data for a set of commodities (including strongly seasonal commodities) to calculate the index price by using (Annual Basket With Carry Forward Prices method) . Although this method can be successfully used in the context of seasonal&nbs
... Show MoreTV drama has gone through many developmental stages until it reached and settled in the form of TV series of thirty episodes. Alongside the development of the TV technologies and the widespread of satellite channels, the form of the TV drama has changed and the series has consisted of two parts and then parts multiplied until they amounted to ten parts and more. This form of TV drama has become an artistic phenomenon, that once the series is displayed on one of the channels and achieves a noticeable success, its producers work to produce a second part of that series and so on. This form of TV drama has remained away from being researched.
This has urged the researcher to accomplish this study entitled (TV series of multiple parts fro
Purpose: This study aims to shed the light on allusions to real lab rats in Dashner’s trilogy: The Maze Runner (2009), The Scorch Trails (2010), and The Death Cure (2011). It also aims to trace the historical documents and chronicles essential to reveal the justifications behind the vague political and scientific crimes. Methodology: The researchers have used the literary analytical approach to study and analyze selected prominent aspects from each novel; such as the concept of lab rats and genocide crimes in The Maze Runner; references to weather experiments, the climate change conspiracy, gas chambers, and the Holocaust in The Scorch Trails; and finally, the man-made diseases and biological weapons in The Death Cure. Results
... Show MorePurpose: This study aims to shed the light on allusions to real lab rats in Dashner’s trilogy: The Maze Runner (2009), The Scorch Trails (2010), and The Death Cure (2011). It also aims to trace the historical documents and chronicles essential to reveal the justifications behind the vague political and scientific crimes. Methodology: The researchers have used the literary analytical approach to study and analyze selected prominent aspects from each novel; such as the concept of lab rats and genocide crimes in The Maze Runner; references to weather experiments, the climate change conspiracy, gas chambers, and the Holocaust in The Scorch Trails; and finally, the man-made diseases and biological weapons in The Death Cure. Results
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables