This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
In the name of of Allah the Merciful
Research Summary
This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).
The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base
... Show MoreRemoval of direct blue dye by electrocoagulation method has been investigated using aluminum electrode in a bench-scale electrochemical system. Current density, NaCl concentration, electrocoagulation time, and dye concentration has been studied as effecting parameters in color removal efficiency. Increasing of current density will increase the color removal efficiency and energy consumption as well. While increasing NaCl concentration increase the color removal efficiency but it decrease energy consumption. High dye concentration is needed for extra electrocaogolation time to reach the same efficiency that obtained with low dye concentration .With current applied 0.35 amps. and NaCl concentration of 2 g/l more
... Show MoreThis research aims at investigating pupils’ ability in using discourse markers which are identified in the English textbooks of secondary schools. Four texts are chosen from third intermediate class. The four texts are short stories of different topics.
This research hypothesizes that there are no statistical significant differences among Iraqi intermediate pupils’ ability in using textual
... Show MoreA computational investigation is carried out in the field of charged particle optics with the aid of the numerical analysis methods. The work is concerned with the design of symmetrical double pole piece magnetic lens. The axial magnetic flux density distribution is determined by using exponential model, from which the paraxial-ray equation is solved to obtain the trajectory of particles that satisfy the suggested exponential model. From the knowledge of the first and second derivatives of axial potential distribution, the optical properties such as the focal length and aberration coefficients (radial distortion coefficient and spiral distortion coefficient) are determined. Finally, the pole piece profiles capable of pr
... Show MoreIsolation and identification fungi of Emericella nidulans and Aspergillus flavus from a pinkish and yellowish artificial clay, by using potato dextrose agar (PDA). Results revealed that E. nidulans was the best for degrading anthracene (92.3%) with maximum biomass production (3.7gm/l), compared to A. flavus with the rate of degradation (89%) and biomass production of (1.2gm/l), when methylene blue was used as redox indicator after incubating in a shaker incubator 120rpm at 30Co for 8days. Results indicated that E. nidulans has a high ability of anthracene degradation with the rate of (84%), while A. flavus showed the lower level with (77%) by using HPLC.
Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show More