The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
The research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.
Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL
The research aims to measure the extent of the impact of Earnings quality in the continuity of the company for a sample of private commercial banks listed on the Iraq Stock Exchange. The research sample included (15) of the listed commercial banks that continue to issue their financial statements for the period from (2009-2018).The research relied on three main models of measurement and on four steps. The first step is to measure the Persistence (Earnings Quality) by Depending the sustainability model. While the second step included measuring the Predictability of accounting profits by deriving the square root of the disparity of the estimation error from the first model Persistence (Earnings Quality), and the third step included
... Show MoreObjective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil
... Show MoreThe research problem focused through the researcher's experience in the gymnastics game and the lack of use of educational models that give the student an important role in the educational process, so it became necessary to identify the type of prevailing style for students, and the need for diversity in the use of educational models based on scientific theories, including the Daniel Document model. Based on three theories of learning, which are structural, behavioral, and meaningful learning. The research aimed to identify the effect of using the Daniel model for people with two types of brain control (left and right) to learn the skill of the Cartwheel in artistic gymnastics for students of the second stage. The researcher used the experi
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreBackground: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X
... Show More