This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.
طريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show MoreThe research problem focused through the researcher's experience in the gymnastics game and the lack of use of educational models that give the student an important role in the educational process, so it became necessary to identify the type of prevailing style for students, and the need for diversity in the use of educational models based on scientific theories, including the Daniel Document model. Based on three theories of learning, which are structural, behavioral, and meaningful learning. The research aimed to identify the effect of using the Daniel model for people with two types of brain control (left and right) to learn the skill of the Cartwheel in artistic gymnastics for students of the second stage. The researcher used the experi
... Show MoreBackground: Cardiopulmonary resuscitation (CPR) is a technique or procedure that combined chest compression and rescue breathing to maintain enough circulation that prevents brain damage until other essential steps are taken to control the main cause of cardiac and respiratory arrest. The health care personnel should be qualified in the performing of cardiopulmonary resuscitation (CPR) to improve the survival rate of the victims. Therefore; it is necessary to use new methods for learning [1]. Objectives: the study aims to compare the effectiveness of self-instructional teaching strategy and traditional teaching approach on student’s knowledge toward cardiopulmonary resuscitation. Methods: A randomized comparative trial (RCT) design was ca
... Show MoreIn this research, we have achieved the description of radionuclides that exist in the samples of Diyala river sediments as well as to measure the specific activities using gamma-ray spectroscopy. The eleven samples were collected among the length of Diyala River starting from Al- Rustumiya and finishing at the point where Diyala River meets Tigris which is in Baghdad. Gamma-ray spectrometry system consists of high-purity germanium detector (HpGe) with 50% efficiency and resolution (2.2 keV) for the energy (1332 keV) was used for standard source 60Co. Card spectrum analyzer connected to the PC type Pentium 4 was used to view the spectrum. And rates of the speci
... Show More
The research aims to identify the magnitude of the impact of external debt on the gross domestic product in Morocco, and the importance of research lies in the role that external debt plays in addressing structural imbalances, if it is best disposed of according to well-studied economic plans by specialists in this regard, especially if these debts are directed with Other resources, as it helps pay the costs of these debts (debt servicing) that the external debt also raises the level of gross domestic product, and the research starts from the hypothesis that: There is an effect of foreign debt on the GDP in Morocco, has contributed in one way or another to The exacerbation of the external debt, which affected the m
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More