One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.
The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis study aimed to synthesize a novel amide prodrug of metformin with aspirin by amide bond. The structure was characterized by (FTIR, 1H-NMR, 13C-NMR and CHNO) ,Purification of the prepared compound was using column chromatography. Using of 40 rabbit having the same weight and devided into 4 groups (4x10) the first group (G1): (the control healthy group) was given drink water and didn’t give any material, second group(G2):( the control infected group) was given hydrogen peroxide concentration % 0.5 until infecting diabetes mellitus, third group(G3): was given hydrogen peroxide concentration as in (G2) and ( 250 mg/kg) of aspirin and (348.8 mg/kg
... Show MoreSystemic lupus erythematosus (SLE) is a chronic, autoimmune disease, with a wide range of clinical symptoms. Some studies have indicated the association between RANKL, Sclerostin, PD-1, and vitamin D concentrations and the pathogenesis of SLE. The current study aimed to evaluate the role of RANKL, Sclerostin, PD-1 and vitamin D in the pathogenesis of SLE. The study included 180 females diagnosed SLE patients and healthy control (60 females as early diagnosed patients without treatment, 60 females as patients under treatment with (prednisolone, and hydroxychloroquine), and 60 females healthy as a control group, with ages ranging from 20 to 45 years. The serum concentration levels of RANKL, Sclerostin, PD-1 and vitamin D were assessed by E
... Show MoreSevere Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) has caused enormous issues worldwide and is the most infectious pandemic. This study included 50 subjects (evenly distributed between sexes) and their range of ages starting from 2 to 67 years. According to the study's result, the ages and genders of subjects include susceptibility to COVID-19. Males were found to be more infected than females, and the ages of 36 to 67 were more common than other age ranges. Also, BMI calculations revealed that male patients with COVID-19 have the highest percentage of obesity. The clinical parameter results have been found serum C‐reactive protein (CRP) as an essential indicator that changes significantly in infection with COVID‐19 an
... Show MoreThe aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.
Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show More
When the financial resources of individuals and groups available, this will lead to increase the consumption ranges and sometimes reached to excessive especially to the categories that have little awareness about economic importance and its reflections. it seems that consumerism has increased in many countries including Iraq because of many factors, and the most important one is the availability of financial resources as a result of the increase in oil exports as well as the spread of consumption media department at various levels especially.