Preferred Language
Articles
/
jcoeduw-774
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 05 2023
Journal Name
Environmental Science And Pollution Research
Photocatalytic degradation of ciprofloxacin by MMT/CuFe2O4 nanocomposite: characteristics, response surface methodology, and toxicity analyses
...Show More Authors

View Publication
Scopus (31)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Synthesis and Study NiO Charactrization of Extract from Green Tea Plant Prepared by Chemical Method
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Civil And Environmental Engineering
Enhancing the Structural Analysis of Rc Piled - Raft Foundation by Actual Behaviour of Supporting Piles
...Show More Authors
Abstract<p>This paper presents a numerical analysis of the piled-raft foundation (PRF) based on the actual behavior of supporting piles. The raft was modeled as a thin plate, while the piles were modeled as springs in different ways. This research also aims to propose an analytical model of piles based on actual behavior at fieldwork. The results proved that the structural behavior of raft member can be improved through utilizing the actual behavior of supporting piles. When the piles were modeled as non-linear stiffness springs, settlements and bending stresses of raft foundation were reduce marginally as compared with those obtained from piles with linear stiffness springs.</p>
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Influence of Brucella melitensis Viability by the Activity of Classical Yoghurt Starter During Milk Fermentation
...Show More Authors

Brucella melitensis isolates were obtained from human infections , and milk which obtained from aborted sheep at Mosul city vicinity . One isolate from each source was used in carrying out this study. Brucella liquid culture was added to sheep milk at 2.5 % for treatments . To first treatment 2 % of yoghurt starter ( Lactobacillus delbrueckii subsp. bulgaricus and Streptococcus salivarius subsp. thermophilus ( 1: 1 ) ) . Second treatment was carried out without addition of yoghurt starter but the pH was lowered using lactic acid in pattern similar to first treatment . Third treatment was similar to the first treatment but contained buffer to alleviate the reduction in pH , which reduced to 6.1 in comparison to 4.9 of the first treatment .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Stylistic Analysis of the Ideological Positioning in Some Selected Poems by John Donne
...Show More Authors

This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Desalination And Water Treatment
Electrosorption of cadmium ions from the aqueous solution by a MnO2/carbon fiber composite electrode
...Show More Authors

The nanostructured MnO2 /carbon fiber (CF) composite electrode was prepared using the anodic electrodeposition process. The crystal structure and morphology of MnO2 particles were determined with X-ray diffraction and field-emission scanning electron microscopy. The electrosorptive properties of the prepared electrode were investigated in the removal of cadmium ions from aqueous solution, and the effect of pH, cell voltage, and ionic strength was optimized and modeled using the response surface methodology combined with Box–Behnken design. The results confirm that the optimum conditions to remove Cd(II) ions were: pH of 6.03, a voltage of 2.77 V, and NaCl concentration of 3 g/L. The experimental results showed a good fit for the Freundli

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Study of Power Increase Transient in Heat Generation Systems Simulated By Immersed Heat Source
...Show More Authors

Theoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu

... Show More
View Publication Preview PDF
Crossref