Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.
This study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI,
... Show MoreKeys to four genera and twelve species of the subfamily Phlaeothripinae (Phlaeothripidae) were constructed, these are: Haplothrips; Karnyothrips; Phlaeothrips; and Dolicholepta ,and the species are: Haplothrips cerealis Priesner; Haplothrips tritici kurdjumov, Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday) ؛ Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner ; Haplothrips pharao Priesner ; Phlaeothrips sycomri Priesner ; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall) ; Dolicholepta micrurus (Bagnall). These were collected from Baghdad
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
Organohalosilanes conslitute an important subject ١٦؛ the chemistry oforganosilicon compound؛. Being starting materials and intermediates in the synthesis of a large number of various compounds so it is very important to get such materials in its highest purity ,but the separation of rathylchlorosilanes was still a big^oblem, duet^the great similarity in their physical and chemical properties, making its analysing verydifficult, ^or this reason tteir must be a good method o^e^r^iondealing^ththe^compounds, gas- liquid chromatography proved that it was the best, specially when (m- nitrotoluene) was used as a stationary liquid phase, it gave a complete separation and a good statistical results
Keys for 22 species representing 10 genera of Thripidae were provided collection of
samples carried out during 1999-2001 in different localities in the middle of Iraq. Of them
four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips
bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another
fourteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.);
Microcephalothrips abdominils (Crawford Scolothrips sexmaculatus (Pergande),);Scolothrips
pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella
schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Marchal; Retithrips
java
Keys for 22 species representing ten genera Thripidae collection carried out during 1999-2001 in different localities in the middle of Iraq. Of them four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another thirteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.); Microcephalothrips abdominils (Crawford); Scolothrips pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Mar
... Show MoreAll modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, r
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show Moreيعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show More