The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreBackground: With the increased in the demands of adult orthodontics, the challenge of direct bonding to non-enamel surface (zirconium) had been increased. The present study was carried out to compare the shear bond strength of three different brackets (stainless steel, sapphire and composite) bonded to zirconium surface and study the mode of bond failure. Materials and methods: The sample was comprised of 30 models (8mm *6mm*1.5mm) of full contour zirconium veneers. They were divided into three groups according to the brackets type; all samples were treated first by sandblast with aluminum oxide particle 50 µm then coated by z-prime plus primer. A central incisor bracket of each group was bonded to the prepared zirconium surface with lig
... Show MoreI n vitro rooting plantlets of three sugarcane genotypes(Co.j.64, Co.j.86 and Missan) were cultured in the field after exposed at different doses of gamma rays (1,2,3,4,) kr. Data of reduction percentage on vegetative growth, roots number, length per plant and their diameter were investigated. Results showed gradual reductions in number of shoots, length and diameter as according to increasing of gamma doses. The reduction percentage in shoot number, length were reached 57.86,70.36 % at 4 kr respectively which have mean number and length per plant reached (9.27 and 55.33 cm) as compared with the control treatment ,While 1 kr caused higher percent in diameter reached 9.69 % with mean of diameter per plant reached 2.57 cm. Mean time , Ge
... Show MoreThis study focuses on evaluating the suitability of three interpolation methods in terms of their accuracy at climate data for some provinces of south of Iraq. Two data sets of maximum and minimum temperature in February 2008 from nine meteorological stations located in the south of Iraq using three interpolation methods. ArcGIS is used to produce the spatially distributed temperature data by using IDW, ordinary kriging, and spline. Four statistical methods are applied to analyze the results obtained from three interpolation methods. These methods are RMSE, RMSE as a percentage of the mean, Model efficiency (E) and Bias, which showed that the ordinary krigingis the best for this data from other methods by the results that have b
... Show MoreIn general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show More