The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circular queue in this work allows to encrypt each character of plaintext by one of cipher methods which controlled by control key for selection process. The scheduling of above cipher methods implementation depends on control key. The experiment results of the proposed hybrid text cryptography method shows ability to cipher and decipher an important data with effectively and efficiently. Utilizing the properties of different cipher methods that are scheduled in circular queue (Caesar, Vigenère, Affine, and Multiplicative) leads to consume time less than other methods when they used alone, so, the important concepts in cryptography process such as complexity, integrity, execution time and security are meet in the proposed hybrid text cryptography method in ef ective manner.
Roller Compacted Concrete is a type of concrete that is environmentally friendly and more economical than traditional concrete. Roller Compacted Concrete is typically used for heavy-duty and specialist constructions, such as hydraulic structures and pavements, because of its coarse surface. The main difference between RCC and conventional concrete mixtures is that RCC has a more significant proportion of fine aggregates that allow compaction and tight packing. In recent years, it has been estimated that several million tons of waste demolished material (WDM) produced each year are directed to landfills worldwide without being recycled for disposal. This review aimed to study the literature about creating a Roller-Comp
... Show MoreBackground: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.
Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThe fresh water ecosystem constitute an essential and very important for human life, for this reason it should be kept away from all the chemical pollutants including the pesticides The best way for Fighting harmful insects.(such as Anophles larvae) is by the biological control.
In the present study two species of Cyclopoida: Copepod, Mesocyclops hyalinus and Cyclops agilis آ were used as predators for Anophles larvae.
The data showed that the percentages of predation were 65% and 56%
forM. hyalinus and C. agilis respectively
and the means of predation were 1.3 larvae/ female and 1.1
... Show MoreCharacterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca
... Show MoreThe aim of this work was to develop and validate a rapid and low cost method for estimation of ibuprofen in pharmaceutical suspensions using Reverse-Phase High Performance Liquid Chromatography. The proposed method was conducted and validated according to International Conference on Harmonization (ICH) requirements. The chromatographic parameters were as follows: column of octyldecylsilyl C18 with dimensions (150 × 4.6) mm, mobile phase composed of acetonitrile with phosphoric acid with a ratio of 50 to 50 each using isocratic mode, flow rate of 1.5 mL/min and injection volume of 5 μL. The detection was carried out using UV detector at 220 nm. The method was validated and showed short retention time for ibuprofen peak at 7.651 min, wit
... Show MoreAbstract
The current research aims to identify the effect of the proposed strategy in accordance with realistic mathematics on the achievement and mathematical Interrelation of third Intermediate students. Two samples were tested from the middle third grade in a school affiliated with the General Directorate of Baghdad- Rusafa, the first for the academic year (2022-2021). The experimental group is (30) students taught according to the proposed strategy, and the control group is (30) students based on the traditional method. To achieve the research objective, the researchers developed a test for achievement consisting of (30) items and a test of sports interconnection composed of (20) items. The results of the stu
... Show MoreDuring the 1970s, communicative view of language teaching began to be incorporated into syllabus design. The central question for the proponents of this view was: what does the learner want/need to do with the target language? This lead to the emergence of a teaching method (or approach) called communicative language teaching (CLT) during the late 1970s and early 1980s focusing on the functions that must be incorporated into a classroom. According to Brown (2001:43) CLT is a unified but broadly based, theoretically well informed set of tenets about the nature of language and of language learning and teaching. Harmer (2001:84) states that the communicative approach is the name which was given to a set of beliefs which included not only a
... Show MoreThis article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are include
... Show More