The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re
The effect of subinhibitory concentration of Antibiotics on the Adherence of S.aureus (Coagulase Positive Staphylococci), and S.epidermidis (Coagulase negative Staphylococci) and Pseudomonas aeruginosa, Enterobacter cloacae, Citobacter freundi (Gram negative bacteria) was done and the results revealed that Rifampicin was the best antibiotic inhibiting Staphylococci adherence and Vancomycin has less effect on the adherence of Staphylococci, whereas Tetracyclin was the best antibiotic inhbiting Gram negative bacteria adherence and Amikacin has the lest less effect on inhibiting bacterial adherence.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe research included five sections containing the first section on the introduction o research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel bars effectiveness and the importance of biochemical variables, either the research problem that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are falling and injury Has a negative impact on the performance and lack of sense of movement of is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in the development of biochemical changes to skill of rear vault dismount with one-half twist on parallel bars in gymnastics . And the n
... Show Moreabstract
the research discussed a stage of strategic management. The strategic of the evaluation of the proposed strategy through feedback is to ensure that it is implemented with the least possible variation. The research aims at evaluation a proposed strategy for the Ministry of Planning for the years 2018-2022 in line with the orientations of the state, taking into account the surrounding environmental conditions. It relies on scientific bases and steps to formulate the strategy The extent of the strategy suitability was tested through a set of statistical means and its objectivity was verified through a survey of a number of specialized experts who were selected in accordance with the principle
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More