Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreGeneral propositions have dealt with various indicators and features that frame and describe basic architectural concepts, and from those concepts, the concept of identity will be presented here, which represents the nerve of intellectual vision of the state of architecture development, transformation and change. Due to its deep intellectual basis, it was necessary to study multiple features, especially the achievement feature that was considered a major stage describing the nature of change and shift related to the achievement of concept and its role in the development of the architectural field . &nb
... Show MoreTow results are proved. The first gives necessary and ullicient
conditions for a permutation group to have the prope1ty that each of its rational - valued character can be written as (integral) linear combination of characters induced from the principal characters of certain subgroup. The mher presents that this property is extendable to direct product of groups.
Examples give.
Background: The post-operative acute abdominal complication is one of the most difficult clinical problems facing the surgeon, and it represents a unique challenge for him not only because of the difficulty in making a precise diagnosis but also in the decision for further management . Objective: discuss the post-operative acute abdominal complications requiring re-interventionType of the study: Cross sectional study. Methods : Patients with early post-operative Acute Abdominal complications ( within 30 days from the initial operation ) who required re-intervention were studied prospectively Results :The study included 82 patients 47 of them were females, their age ranging 7-87,Different types of the initial operation were reported,51 %
... Show MoreInterest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreProtease enzyme production was studied and optimized as a first step to collect information about solid state fermenter) to produce protease enzyme. A local isolated Aspergillus niger was used for this study with constant spores feeding in every experiment at (105/g). Experiments carried out in conical flasks with (250 ml) containing (10 g) of wheat straw as a substrate with different conditions included temperature, pH, hydration ratio, and fermentation time, the results comprised by measuring protease activity (u). The results showed that the best activity can be obtained at (T = 32°C, t= 100 hrs, pH= 2.5 and hydration ratio is 1:3). On the other hand the results is courage to p
... Show More