A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The Impact of Intellectual trends on the nature of the Economic Structure of Iraq
Abstract:
Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.
The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)
... Show MoreDust storms are among the most important weather phenomena in Middle East. The Shamal dust storms are dominated across Iraq and the whole Middle East, especially in summer. However, frontal type of dust storms is possible in winter and spring. In this research, a comprehensive case study was conducted to a dust storm that occurred on 20 March 2016 from many perspectives: synoptic, satellite imagery, dust concentration analysis, visibility reduction, and aerosol optical depth. The study shows that the dust storm initiated inside Syria and moved eastward with the movement of the front. Dust concentrations and aerosol optical depth were also discussed that simulate the dust storm over Iraq in a reasonable way with some differences. The dust
... Show Moregenerator the metal conductor is replaced by conducting gas plasma.
Need organizations today to move towards strategic thinking which means analyzing situations faced by particular challenges of change in the external environment, which makes it imperative for The Organization That to reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures, to try to achieve improvement root in the installation of the organization and methodscompletion of its work towards achieving high levels of performance and that is reflected to achieve its objectives, and this is what aims to Current search to deal with implications characteristics of strategic thinking in the stages of application re-engineering business of the company General Industries
... Show MoreThe investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat
... Show MoreSystems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreWith the quick grow of multimedia contents, from among this content, face recognition has got a lot of significant, specifically in latest little years. The face as object formed of various recognition characteristics for detect; so, it is still the most challenge research domain for researchers in area of image processing and computer vision. In this survey article, tried to solve the most demanding facial features like illuminations, aging, pose variation, partial occlusion and facial expression. Therefore, it indispensable factors in the system of facial recognition when performed on facial pictures. This paper study the most advanced facial detection techniques too, approaches: Hidden Markov Models, Principal Component Analysis (PCA)
... Show More