MB Mahmood, BN Dhannoon
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
The efficiency of solar energy absorption in solar heaters is increased by the use of selective absorption coating that possesses high absorption of solar radiation in the UV-visible spectrum as well as low emission at the operating temperature in the infrared region. In this work, novel selective coatings were synthesized by improving the selectivity of chromium oxide (Cr2O3) nanoparticles by doping with carbon nanoparticles using the exploding wire technique for carbon rods by high current in suspended Cr2O3 particles. The structural properties and surface topography were studied by XRD and FE-SEM, which illustrate the carbon-coated Cr2O3 nanoparticles. The prepar
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Islamic Issue did not rise the “widespread arguments” in contemporary times, just as the issue of applying Islamic Law. Just as the Islamic forces used this purpose, or employed it during their march to reach to power by adopting the sacred as motivation towered the power, or control the governance. However, the reality show that this goal remained within the boundaries of slogans in the sense of a teleological slogan, and did not go beyond the limits of advocacy or arrangement as the primary source of legislation with differences of teleological reasoning, in a manner that reflected an intellectual problem about the validity of the use of this concept or the ability to apply and enforce the law in today's world, to impose
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Background: The elimination of the microorganisms from the root canal systems, an important step for the successful root canal treatment. This study was conducted to evaluate the antibacterial effectiveness of the photoactivated disinfection by using the toluidine blue O and a low- energy light emitting diode (LED) lamp . Materials and method: Sixty single rooted extracted teeth were decoronated, instrumented, irrigated, sealed at the apex and contaminated with endodontic anaerobic bacteria for 7 days to form biofilms in prepared root canals. Group I. Twelve teeth were medicated by photosensitizer (toluidine blue O) solution activated by diode lamp (FotoSan; CMS Dental, Copenhagen, Denmark).Group II. Twelve teeth were medicated by the tricr
... Show MoreTax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreIn the present study, the effect of Zinc nanoparticles on levels of (T3 , T4 and TSH) hormones was investigated. Zinc nanoparticles were synthesized by Laser induced plasma.The Nd: YAG Nd: YAG laser with a wavelength of 1064 nm was used to generate nanomaterials of the elements (zinc) upon collision with target atoms. Plasma generated by different laser intensity is generated. After confirming the preparation of zinc nanoparticles, XRD, AFM was examined, and the effect of these substances on the thyroid gland (T3, T4, TSH) was observed for two doses of each component (1 ml / kg, 4 ml / kg) after conducting a cytotoxicity examination of the lymphocytes of the rats extracted from Rat spleen was 1.8% less toxic to zinc, and as noted The
... Show More