The research aim was to observe the distribution pattern of
This study included preparation for the unsaturated polyester samples before and after reinforced by Alumina oxide powder and copper oxide powder of different volume fraction amounting (3%,5%,8%). And this reearch included study of some of mechanical properties such as (hardness,compressive and wear).The results showed that increase of the hardness and compressive strength after the reinforced and increase with the volume fraction increase.As the wear test show that the wear rate increases with applied load from the different load(5,10,15)N,and the wear rate decreases with the volume fraction increase.
This research paper aims at studying the effect of adopting the corporate social responsibility on marketing performance indicators, where the study adopted the descriptive method for theoretical concepts, in addition to the statistical approach by using the SPSS v25 program to analyze the questionnaire and test the hypotheses of the study. The results showed that there is a positive correlation between social responsibility and marketing performance indicators, and the study found that it is better for NAFTAL Company to mix the environmental and social responsibilities in order to improve its marketing performance. Also, the study recommended that Naftal should adopt the four responsibilities equally, correctly and make its work
... Show MoreE-learning is a lifeline for the educational process, which contributed to the sustainability of working educational organizations and prevented them from stopping, so the study came to measure the compatibility between E-learning quality dimensions (information technology, educational curricula, teaching methods, and intellectual capital of educational institution) as an independent variable, and educational services quality dimensions represented by (safety, tangibility, reliability and Confidence) as a dependent variable. The sample was 150 teachers was drawn from the College of Administration and Economics community of 293 teachers through the use of several statistical methods to measure the degree of correlation and impact between the
... Show MoreThe grain hardness, wet and dry gluten contents, protein and ash contents are determined in grains from different cultivars of wheat which are important in food products, either which are present in raw materials or in final products. Wheat is also a very important food raw material, and flour as the final product of milling. The importance of knowing the physical and chemical properties of wheat and flour is due to the determination of quality and kind of flour which is produced after the milling process. In this work, some physical and chemical properties of different wheat cultivars are determined and the comparisons of these characteristics are performed in both wheat and flour. Uruq Wheat sample (W5) has the highest results when compar
... Show MoreThe importance of the construction sector and its Great role in the provision of services and infrastructure, reduce poverty, improve living conditions and improve the economic situation in the country, impose attention to the way in which the projects implemented for its improvement and to get successful projects. The objective of this research was to determine the criteria for success as well as critical success and failure factors that have a significant impact on project success. A selected 75 engineer (department managers, project managers and engineers) are asked to fill the questionnaire form, Sixty-seven valid questionnaire forms were analyzed statistically to get search results, which were as follows : Twe
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More