The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
In this work, pure and copper mixed oxide PAni nanofiber thin films are successfully synthesized on silicon substrates by hydrothermal method and spin coating technique at room temperature with thickness of about 325 nm. The structural, surface morphological, optical and photoconductivity properties have been investigated. The XRD results showed that PAni films have crystalline nature, CuO and PAni/CuO nanostructure composites are monoclinic polycrystalline structure. The FESEM images of PAni clearly indicate that it has nanofiber-like structure, whereas the CuO film has spongelike shape. The surface morphology analysis of PAni/CuO composite shows that nanofiber caped with inorganic material which is CuO is a core-shell structure. Op
... Show MoreThis study was designed to evaluate the ability of bioemulsifier to inhibit the growth of some pathogenic microorganisms. Fourteen isolates belonged to Serratia sp. were collected and tested for their ability to produce bioemulsifier. Results showed that Serratia marcescens S10 (isolated from the gut of the American cockroach) had the highest ability to produce bioemulsifier, among 14 isolates belong to Serratia spp. and it had the ability to inhibit the growth of some microorganisms. The production of bioemulsifier was detected by determination of emulsification index (E24%), qualitative drop-collapse test, emulsification activity (E.A) and measuring the surface tension (S.T). The results of bioemulsifier produced by Serratia marcescens S1
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreThe adsorption of hexavalent chromium by preparing activated carbon from date seeds with zinc chloride as chemical activator and granular date seeds was studied in a batch system. The characteristics of date seeds and prepared activated carbon (ZAC) were determined and found to have a surface area 500.01 m2/g and 1050.01 m2/g , respectively and iodine number of 485.78 mg/g and 1012.91 mg/g, respectively. The effects of PH value (2-12), initial sorbate concentration(50-450mg/L), adsorbent weight (0.004-0.036g) and contact time (30-150 min) on the adsorption process were studied . For Cr(VI) adsorption on ZAC, at 120 min time contact, pH solution 2 and 0.02 adsorbent weight will ach
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show More