Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show Moreخلٌقت مشتقات الجديدة من4-methyl-7-ethylcoumarin التي تحمل مجموعة azo من خلال سلسلة من التفاعلات المتسلسلة واختبار نشاطها البيولوجي. بدءًا من 7-اثيل-4-مثيل كومارين الذي حضٌر من تفاعل ميتا اثيل فينول مع اثيل اسيتو اسيتيت بواسطة تفاعل بكمان بعدها تم نيترة 7-اثيل-4-مثيل كومارين باستخدام حامض النيتريك بوجود H2SO4المركز لإنتاج ايزومر واحد 7-اثيل-4-مثيل -8-نايتروكومارين تحت التبريد في درجة حرار Co (2-5) ، ثم اختزال
... Show Moreتمت دراسة الزوج المجري Sip-39 باستخدام طرق القياس الضوئي والطيفي. البيانات الرصدية اخذت من اصدار البيانات السابع عشر (DR17) من "Sloan Digital Sky Survey (SDSS)" وتمت عمل ال fitting لصور المجرتين باستخدام برنامج (IRAF) من خلال المكتبةSTSDAS باستخدام ELLIPS task.تم دراسة وحساب كل من اللمعان السطحي للمجرتين في الزوج ، بالإضافة إلى الانبعاث الكلي ، وشكل القطع الناقص ، وزوايا انحراف المحور الكبير، الانحرافات العمودية والأفقية ، ومعاملا
... Show Moreفي هذه المقالة ، يتم فحص تأثير متغير الدوران والمتغيرات الأخرى على التدفق التمعجي لسائل Powell-Eyring في قناة غير متماثلة مائلة مع مجال مغناطيسي مائل عبر وسط مسامي مع نقل الحرارة. يُفترض الطول الموجي الطويل وعدد رينولدز المنخفض ، حيث يتم استخدام نهج الاضطراب لحل المعادلات الحاكمة غير الخطية في نظام الإحداثيات الديكارتية لإنتاج حلول متسلسلة. يتم التعبير عن توزيعات السرعة وتدرجات الضغط رياضيًا. من خلال جمع الأرقام
... Show MoreLet h is Γ−(λ,δ) – derivation on prime Γ−near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ−hom. or acts like anti–Γ−hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreModern education incorporates strong elements of collaborative learning: activities that prompt students to collaborate on completing learning tasks. In this work we investigate the relationship between media type and student collaboration and attribution patterns during collaborative content creation. We run similarity analyses on text and video artifacts submitted by students as part of collaborative exercises in an undergraduate module. Our main finding is that the same cohort of students was significantly more likely to attribute non-original content to its sources when authoring text compared to video content and when this content is not produced by a peer student. Our preliminary results based on only two media suggest that media type
... Show Moreفي هذا البحث تم دراسة تأثير متغير الدوران والمتغيرات الأخرى على التدفق التمعجي لسائل سوتربي في قناة غير متماثلة مائلة تحتوي على وسط مسامي مع انتقال الحرارة. في وجود الدوران، تم تطوير النمذجة الرياضية باستخدام المعادلات الاساسية القائمة على نموذج سائل سوتربي. في تحليل التدفق، يتم استخدام افتراضات مثل تقريب طول الموجة الطويلة وانخفاض عدد رينولدز. تم حل المعادلة التفاضلية الاعتيادية غير الخطية الناتجة تحليل
... Show MoreLet
تم تصنيف ترسة الفرات ملساء الصدفة Rafetus euphraticus على أنها مهددة بخطر الانقراض ضمن القائمة الحمراء للاتحاد الدولي لحفظ الطبيعة، ويُعتقد أنها تعرضت لانخفاض كبير في أعدادها مؤخرًا. تقتصر معلومات الأنواع في العراق على عدد قليل من المسوحات السريعة مع القليل من المعلومات التفصيلية عن التربية والتوزيع. هدفت الدراسة الى تقدير اعداد سلاحف الفرات ملساء الصدفة في الأهوار الوسطى باستخدام استقراء بسيط للعدد.
... Show MoreData of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased
... Show MoreThe BEK family of flows have many important practical applications such as centrifugal pumps, steam turbines, turbo-machinery and rotor-stator devices. The Bödewadt, Ekman and von Kármán flows are particular cases within this family. The convective instability of the BEK family of rotating boundary-layer flows has been considered for generalised Newtonian fluids, power-law and Carreau fluids. A linear stability analysis is conducted using a Chebyshev collocation method in order to investigate the effect of shear-thinning and shear-thickening fluids for generalised Newtonian fluids on the convective Type I (inviscid crossflow) and Type II (viscous streamline curvature) modes of instability. The results reveal that shear-thinning power-law
... Show MoreWe observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and
Coronavirus is an RNA (Ribonucleic acid) virus in the coronaviridian family that causes zoonotic and infectious diseases transmitted between animals and evolved between humans. This class of pathogens is responsible for respiratory diseases. Coronavirus refers to the crown-like protrusions on the outside surface of the virus. Corona is an infection that causes breathing difficulties in humans. In epidemics, symptomatic techniques based on graphic design are essential for examining the causes of influence, which leads to better results than primary radioscopy mechanisms for identifying and diagnosing COVID-19 cases. The urgent need to employ artificial intelligence in disease detection arose from this standpoint. In this paper, a system i
... Show MoreA hybrid cadmium sulfide nanoparticles (CdSNPs) electroluminescence (EL) device was fabricated by Phase – Segregated Method and characterized. It was fabricated as layers of (ITO/poly-TPD:CdS ) and (ITO/poly-TPD:CdS /Alq3). Poly-TPD is an excellent Hole Transport Layer (HTL), CdSNPs is an emitting layer and Alq3 as electron transport layer (ETL). The EL of Organic-Inorganic Light Emitting Diode (OILED) was studied at room temperature at 26V. This was achieved according to band-to-band transition in CdSNPs. From the I-V curve behavior, the addition of Alq3 layer decreased the transfer of electrons by about 250 times. The I-V behavior for (poly-TPD/CdS) is exponential with a maximum current of 4500 µA. While, the current i
... Show MoreEugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh
... Show MoreAccording to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show More