This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
RA is a complex chronic disease, primarily affects the lining of the synovial joints and can cause progressive disability, premature death, and socioeconomic burdens. The clinical manifestations of symmetrical joint involvement include arthralgia, swelling, redness, and even limiting the range of motion. The pathogenesis is not known therefore the study included Rheumatoid arthritis (RA) is one of systemic inflammatory diseases that characterized by a progressive disabling course. The study included patients suffering from RA and as healthy controls. immunological and genetic factor were evaluated in each subject by using serum level of cytokine and genetic factor. The etiopathology of the disease is not well known for this reason the study
... Show MoreBackground: periodontitis is a chronic inflammatory disease causing destruction of the tooth supporting structures, initiated by dental plaque and modified by environmental and genetic risk factors. Cyclooxygenase-2 (COX-2) enzyme is responsible for the production of prostaglandin E2, an important mediator in the chronic periodontitis (CP) pathogenesis. Polymorphisms in COX-2 gene have linked to CP in different populations. Aim: To study the association between Cyclooxygenase-2 single nucleotide polymorphism rs689466 (-1195A/G SNP) and chronic periodontitis in a sample of Iraqi population. Methods: One hundred Iraqi subjects divided into two groups: case group consisted of 70 CP patient (35 males and 35 females) with age range 30-55 year
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreThe experiment was carried out at the Field Crops Research Station, College of Agricultural Engineering Sciences - University of Baghdad in Jadiriyah, with the aim of evaluating the performance of partial diallel hybrids and inbred lines of maize and estimating general combining ability(GCA), specific combining ability (SCA) and some genetic parameters. The experiment was carried out in two seasons, spring and fall 2020. Eight inbred lines of maize were used in the study (BI9/834, BSW18, LW/5 L8/844, ZA17W194, Z117W, ZI17W9, ZI7W4), numbered (1,2,3,4,5,6,7,8), It was sowed in the spring season and entered into a cross-program according to a partial diallel crossing system to obtain tw
Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show MoreThere are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreThe study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreM(II) Ions using amino acid L- proline as a primary ligand and either Nicotinamide or 8- hydroxyqinoline as secondary ligand, respectively: a. The mixed ligand complexes of composition,[M(pro)2(na)2]. b. The mixed ligand complexes of composition , Na[M(pro)2(Q)]. Where proline (C5H9NO2) symbolized as pro H , Nicotinamide (C6H6N2O) symbolized as (NA) , 8- hydroxyqinoline, (C9H7NO2) symbolized as (8-HQ). The ligands and the metal chlorides were brought into reaction at room temperature (37ºc) in ethanol as solvent .The reaction required the following molar ratios [(1:2:2) metal:2NA:2pro-] and [(1:1:2) metal:Q:2pro-] with M+2 ions, where M = [Mn (II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and pd(II)]. Products were found to be solid crystall
... Show MoreN-Pyridin-2-ylmethyl-benzene-1,2-diamine (L) was prepared from the reaction of ortho amino phenyl thiol with 2 – amino methyl pyridine in mole ratio (1:1) . It was characterized by elemental analysis (C.H.N) , FT-IR , Uv – Vis , 1H , 13C-N.M.R . The complexes of the bivalent ions (Co , Ni , Cu ,Pd , Cd , Hg and Pb) and the trivalent (Cr) have been prepared and characterized too . The structural was established by elemental analysis (C.H.N) , FT-IR , Uv – Vis spectra , conductivity measurements , atomic absorption and magnetic susceptibility . The complexes showed characteristic behavior of octahedral geometry around the metal ions and the (N,N,N) ligand coordinated in tridentat mode except with Pd complexes sho
... Show More