This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
The Log-Logistic distribution is one of the important statistical distributions as it can be applied in many fields and biological experiments and other experiments, and its importance comes from the importance of determining the survival function of those experiments. The research will be summarized in making a comparison between the method of maximum likelihood and the method of least squares and the method of weighted least squares to estimate the parameters and survival function of the log-logistic distribution using the comparison criteria MSE, MAPE, IMSE, and this research was applied to real data for breast cancer patients. The results showed that the method of Maximum likelihood best in the case of estimating the paramete
... Show MoreThe prediction process of time series for some time-related phenomena, in particular, the autoregressive integrated moving average(ARIMA) models is one of the important topics in the theory of time series analysis in the applied statistics. Perhaps its importance lies in the basic stages in analyzing of the structure or modeling and the conditions that must be provided in the stochastic process. This paper deals with two methods of predicting the first was a special case of autoregressive integrated moving average which is ARIMA (0,1,1) if the value of the parameter equal to zero, then it is called Random Walk model, the second was the exponential weighted moving average (EWMA). It was implemented in the data of the monthly traff
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreWe have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD) to estimate the parameters an
... Show MoreWe have focused the research problem through an assessment of the applicability of the third pillar of the decisions of the Basel Committee 11 (market discipline) or not and its impact on both the adequacy of bank capital, supervisory oversight and banking risks and the statement weaknesses commitment banking institutions and which in turn lead to the stability of the financial system as a whole. .
The research is important statement on the importance of big capital in the banking business and the attributes of a role in the absorption of losses suffered by the bank, which reflects the willin
Aufhebung gesellschaftlicher,geistiger und ischer Schranken durch die Aufklarung
Diabetic retinopathy is one of most important complications of diabetes mellitus that can be treated by Nd:YAG laser. Laser is used in ophthalmic practice for photocoagulation and photodisruption. The purpose of this study is to evaluate changes in immunological ,hematological and biochemical values after treatment of diabetic retinopathy by laser. Blood samples from 10 patients suffering from diabetic retinopathy were taken before and after laser treatment to coagulate retina to prevent leakage and hemorraghe to avoid deterioration of vision.In group one (4 patients = 40%), blood tests were done one day after treatment. In group two (6 patients =60%) tests were done 7 days after treatment with laser. The study showed no clear changes in
... Show More<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and
... Show MoreThe current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtai
... Show More