In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreToday, the success or failure of organizations depends to possess the wisdom of their managers promised that the key to organizational success of the business environment, making the right decisions, and create the ability to work and think towards discrimination of products and services the organization . Seek this research to investigation the relationship between the wisdom management and differentiation strategy for service operations . It was a test of that relationship in light of the results of the analysis of the data collected through the questionnaire distributed on a sample from (98) Director Mangers, head of department and head of division in the General Establishment of Civil Aviation . The research used descriptive st
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 6
This article discusses some linguistic problems that arise when translating the Holy Quran from Arabic to Russian. We analyze lexical, syntactic and semantic problems and support them with Examples of verses from the Qur'an, since the Qur'an is the word of Allah. It contains prayers and instructions full of both literal representations and figurative comparisons. The identification of linguistic and rhetorical features challenges translators of the Holy Qur'an, especially when translating such literary devices as metaphor, assonance, epithet, irony, repetition, polysemy, metonymy, comparisons, synonymy and homonymy. The article analyzes: metaphor, metonymy, ellipsis, polysemy.
<span lang="EN-GB">This paper highlights the barriers that have led to a delay in the implementation of E-Health services in Iraq. A new framework is proposed to improve the E-Health sector using a SECI model which describes how explicit and tacit knowledge is generated, transferred, and recreated in organizations through main stages (socialization, externalization, combination and internalization). Class association rules (CARs) is integrated to mine the SECI model by extracting related rules which correspond to the medical advice. The proposed framework (SECICAR) can be done through a web portal to assemble healthcare professionals, patients in one environment. SECICAR will be applied to the hypertension community to show th
... Show More