This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
Toxoplasma gondii is an obligate intracellular protozoan parasite; it spreads via the circulatory system during infection and causes chronic infection in various organs. Toxoplasmosis affects nearly one third of people worldwide, especially immunocompromised people. This study aimed to determine the effect of toxoplasmosis on renal function in hemodialysis patients. Overall 300 patients referred to the Medical City, Al-Karama General Hospital, Baghdad, Iraq were enrolled from 2021 to 2022. All serum samples were tested for T. gondii immunoglobulins (IgG and IgM) antibodies, urea and creatinine levels. In patients undergoing hemodialysis, the results revealed a high positivity percentage for anti-Toxoplasma IgG. In hemodialysis patients infe
... Show MoreThis study aims to identify the teaching problems that teachers of students with intellectual disabilities face, in addition to exploring the solutions suggested by them in order to overcome such problems or challenges. The researchers used a qualitative approach in order to understand the teachers' perceptions about these problems in a more in-depth way. The interview tools (in-depth and semi-structured interviews) were used to collect data from (3) female teachers from special education programs in the Asir region. The results revealed a number of themes including problems related to students, teachers and the teaching methods they use, curricula, school environment, and school administration. Moreover, the results indicated that famil
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe study aims to diagnose the levels of total costs borne by the Diyala State Company, then estimate and analyze the quantitative relationship between the different items of these costs, in addition to the impact of the productive activity on them. This was done by choosing the different variables affecting the costs and their different items for the company under study, and relying on the data issued by the company during the period (2002-2021), based on a methodology that combines the descriptive and econometric methods in order to estimate and analyze the cost function in the concerned company. According to the estimated function of the costs of the company under study, the study concluded that the value of production affects the total
... Show MoreThe eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg
... Show MoreAnger is one of the problems of scientific importance that psychologists and education scientists are interested in, especially societies and educational environments, because if a child’s anger continues to develop into violence, then it becomes an unusual behavior, and an indication of the child's lack of adaptation to his family and his environment (Moses, 2013: 4) &n
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreIn this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More