The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights that are obtained from the learning process within the neural network stage, So the work can be represented as an update or development for using the neural network to enhance the security of text. As a result for a powerful design, the resulted cipher system provides a high degree of security which satisfies the data confidentially which is the main goal of the most cryptography systems.
Starting with a problem of the weakness of accounting disclosure in some companies administration when preparing and presenting the financial reports which are submitted to the Tax authority. This problem impacts on Tax authority performance (The effect on the quality of the performance of the tax authority), because of the lack of conviction for the information contained in those reports, and the failure to achieve accurate results in tax authority performance that leads to a negative impact on determining taxable income and affect tax revenue, as well as negative impact on determining taxable income and affect tax revenue, as well as negati
... Show MoreObjectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form
... Show MoreThe research is an attempt to investigate experimentally the influence of teacher’s errors correction and students’ errors correction on teaching English at the College of Physical Education for Women. Errors are seen as a natural way for developing any language but teachers are puzzled the way they can correct these errors. So, this research gives some idea of using two types of errors correction. The sample of the research is female students of the first year stage at the College of Physical Education for Women of the academic year 2009-2010. The whole population of the research is (94) students while the sample is (64). Thus, the sample represents 68% from the population of the research. The sample represents It is hypothesized th
... Show MoreThrough the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills
... Show MoreAbstract:
Central banks seek to control and supervise credit and follow it up effectively due to the high credit risks surrounding it that may lead to damage to banks, and may even lead to damage to the reputation and confidence of the banking system as a whole.
The main role of supervisory control is to control credit by controlling it from excessive expansion during periods of economic inflation or its revitalization and improvement and expansion of credit transactions in cases of economic recession, or when central banks desire to support the national economy or support a sector of various
... Show MoreBackground: C-reactive protein (CRP) is an acute phase protein that its plasma levels increase after trauma or surgery so it is used as an indicator for the level of inflammation after surgery. The objective of this study is to investigate pre- and post-operative levels of CRP in three types of oral surgical interventions (Apicoectomy, Impaction, and Impacted teeth exposure). Materials and Methods: A total number of (48) healthy individuals aged (20-60) years who needed oral surgical intervention for either (removal of impacted third molars, exposure of an impacted canine, or Apicoectomy). A 4ml venous blood was obtained from each patient at two occasions (pre-operatively at the day of operation and post-operatively after 48 hours), then ce
... Show MoreDesign and build a center basins new p-type four mirrors were studied its effect on all parameters evaluating the performance of the solar cell silicon in the absence of a cooling system is switched on and noted that the efficiency of the performance Hzzh cell increased from 11.94 to 21 without cooling either with cooling has increased the efficiency of the