This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreGypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, perm
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreMicroorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreLarge quantities of contaminated carwash wastewater are produced per day from carwash places. Extensively it contains large quantities of chemicals from detergents, oil, grease, heavy metals, suspended solids, types of hydrocarbons, and biological contents. A novel electrocoagulation treatment by foil electrodes was conducted to remove COD, turbidity, Total Dissolved Solids (TDS) from contaminated carwash wastewater and decrease its Electrical Conductivity (EC). A thin layer of aluminum foil is used as an electrode in this treatment process. The effects of different voltage and treatment times were studied. The best result was found at a voltage of 30 volts and treatment time 90 minute where the removal efficiency of COD
... Show MoreFour samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,
... Show More