Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn this paper, series of new complexes of Manganese(II), Cobalt(II), Nickel (II) Cupper(II) Zinc(II), Cadmium(II) and Mercury (II) are prepared from the new ligand [2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) propanoic acid (BHP) derived from tyrosine and benzoylisothiocyanate .Chemical structures are obtained from their 1 H, 13CNMR spectra (for BHP), elemental microanalyses, molar conductance, FTIR, UV–Vis, magnetic susceptibility in addition to TGA/DTG and DSC analysis, the suggested geometry for all complexes was tetrahedral. The biological activity of BHP and its complexes has been extensively studied against two bacterial species Staphylococcus aurous (G+) and Escherichia coli (G-) by agar-well diffusion technique, where Mn(II), Co
... Show Moreاثناء تفاعل الديزنة تكونت صبغة أزو جديدة عن طريق تفاعل 3-امينوفينول مع 2,4,6-ثلاثي هيدروكسي اسيتوفينون . ثم تم تفاعل هذا الليكاند مع بعض ايونات العناصر الكروم والحديد الروديوم والروثينيوم بتكفؤهم الثلاثي والكوبلت الثنائي والموليبدينوم سداسي التكافؤ مكونة معقدات فلزية مختلفة بأشكال هندسية متعددة. تم ملاحظة تناسق مجموعة الازو مع ايونات العناصر من خلال ملاحظة ظهور حزم امتصاص الفلز مع النتروجين والاوكسجين ب
... Show More