It is known that energy subiect has ocuppied a lot of scientests minds about
how to treat the traditional energy and the renewing energy . we know that
most traditional energy coal , oil , Natural gas, neuclear fuel , are limited
guantiy and alsow subjected to be ended .Statics studies refer to reserve
of oil in world will exhausted btween ( 2075- 2100) and alsow cosl too .
While neuclear fuerl which the world seek today through explod the uranium
atom ( 233) the therum atom (239) and neuclear mxied through ruemlear
mixing , These energy have effect on environment and humanity speciaty if
they are used in militery purposes .
For all theses scientests srarch for resources of renewing enery through
researches studies , using environment technology reduce traditional energy,
they found that the resources of ernewing energy ( sun power , wind power ,
mechanical power of water,chamical power of water , underland power
,aidragyn power , natural power, laser power )
The presnet study try to make suggestd plan to develop the resources of
traditional and contionuos energy and use them in arabic enviroment . The
researcher found there is no plan for developing energy resources , he tried
through this study to present infront of researchers and discuss the geogrphy
teachers role who have the ability and srarch in natural resouces specially
the resources of engery , through planning and developing these resources
reaching to ( sustainable development ) which appear as a new concept for
development and planning after 1997 by ( UN programm ) in developing the
resources of humanity and nature and the right present and future
generation far away from ( poverty + ignorance + disease ) specially in arabic
enviroment
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show Moreالأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreCarbonized nonwoven nanofibers composite were fabricated using the electrospinning method of a polymeric solution composite followed by heat treatment including stabilization and calcination steps. The spun polymeric solution was a binary polymer mixture/organic solvent. In this study, two types of polymers (Polymethylmethacrylate (PMMA) and Polyethylene glycol (PEG)) were used separately as a copolymer with the base polymer (Polyacrylonitrile (PAN)) to prepare a binary polymer mixture in a mixing ratio of 50:50. The prepared precursor solutions were used to prepare the precursor nanofibers composite (PAN: PMMA) and (PAN: PEG). The fabricated precursors nonwoven fibers composite were stabilized and carbonized to produce carbon nonw
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreThis research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023