In this paper, a new tunable approach for fusion the satellite images that fall in different electromagnetic wave ranges is presented, which gives us the ability to make one of the images features little superior on the other without reducing the general resultant image fusion quality, this approach is based on the principal component analysis (PCA) fusion method. A comparison made is between the results of the proposed approach and two fusion methods (they are: the PCA fusion method and the projection of eigenvectors on the bands fusion method), and the comparison results show the validity of this new method.
Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposi
... Show MoreIn this work, N-hydroxy phthalimide derivatives (NHPID) were synthesized from the nucleuphilic substitution reactions of (NHPI) with different halides (alkyl halides, sulfonyl halides, benzoyl halides and benzyl halides). The products were distinguished using FTIR spectrum and Nuclear magnetic resonsnce (1H-NMR and 13CNMR), in addition to other characteristic methods such as sodium fution for sulfur determination. followed by measuring antibacterial (with different types of gram positive/gram negative bacteria) and antifungal activities of these compounds.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreThe conventional solid-state reaction method was utilized to prepare a series of superconducting samples of the nominal composition Bi2-xPb0.3WxSr2Ca2Cu3O10+d with 0≤x≤0.5 of 50 nm particle size of tungsten sintered at 8500C for 140h in air . The influence of substitution with W NPs at bismuth (Bi) sites was characterized by the X-ray diffraction (XRD), scanning electron microscopy (SEM) and dc electrical resistivity. Room temperature X-ray diffraction analysis revealed that there exists two phases, i.e. Bi-(2223) and Bi-(2212), in addition to the impurity phases of (SrCa) 2Cu2O3, Sr2Ca2Cu7<
... Show MoreThis study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreNew substituted anthraquinones with amino derivations fragments were synthesized through the substitution of bromine atom by different amines using the Ullmann coupling reaction. Obtained compounds based on anthraquinone used for experimental antimicrobial studies. The structure of the synthesized compounds was confirmed by LC-MS and 1H, 13C NMR spectroscopy. Studies on planktonic microorganisms have shown that the first synthesized anthraquinone derivatives have an inhibitory effect against bacteria and fungi. The triazene 1-(3-(benzoic acid(triaz-1-en-1-ol(-4-(1H-imidazol-1-yl(-9,10-dioxo-9,10-dihydroanthracene -2-sulfonic acid, have wide spectrum of activity, growth retardation zones against gram-positive micro
... Show MoreIn this paper, investigations were carried out on the effects of simultaneous partial substitution of Tl at the Hg site on the physical properties of an Hg1-xTlxBa2Ca2Cu3O8+δ cuprate superconductor with x= 0, 0.1, 0.2, 0.3 and 0.4. Two steps of the solid state reaction method were used to prepare samples in capsule. The results showed that the optimum sintering temperature was equal to 850 ᵒC and the sintering time was equal to 20 h for the prepared samples.
The best conditions for constitution and stabilization of the high Tc phase-1223 were obtained by investigating the e
... Show MoreIn latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast
... Show MoreThe usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu
... Show More