represent websites link support of human communicate and cohesion of cultures different depending on their languages and their environments around, it was the evolution of one of the most important means of communication of services for electronic networks, the Internet active role in containing the world Bbodqh science and knowledge to Taatlaqah cultures from which derives its intellectual and cognitive cupboards continuity and as a link language for each those environmental Altdadat, linguistic, religious, political, economic . We all know that these electronic means difficult promise ring intellectual and mental connectivity for the masses polarized without being of the image as an element Kravekaa supporter of the electronic media an
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThe first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increase (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography
... Show MoreThe first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increas (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography by
... Show MoreIn this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.
This study was performd on 50 urine specimens of patients with type 2 diabetes, in addition, 50 normal specimens were investigated as control group. The activity rate of maltase in patients (6.40±2.17) I.U/ml and activity rate of maltase in normal (0.44±0.20)I.U/ml. The results of the study reveal that maltase activity of type 2 diabetes patient's urine shows significant increase (P<0.01) compare to normal.
Abstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show More