This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
Forty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes
... Show MoreA simple, accurate and rapid method for separation and determination of most commonly usedinsecticides in Iraq [thiamethoxam (Thi), imidacloprid (Imi), indoxacarb (Ind), and abamectin (Aba)] ispresented. The separation was performed by gradient reversed-phase high performance liquidchromatography on a C18 stationary phase column. The method was developed and validated. The-1mobile phase was a mixture of acetonitrile and water using gradient flow. The flow rate was 1.0 mL min .The optimum temperature of separation was 25 ºC. The detection was performed at multiple wavelengths.The analysis time was up to 10.5 minutes with retention times of 3.221, 3.854, 6.385, and 9.452 min for-1the studied insecticides. The linearity was in the range of 0.
... Show MoreAttention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w
... Show MoreIn this study three reactive dyes (blue B, red R and yellow Y) in single , binary and ternary solution were adsorbed by activated carbon AC in equilibrium and kinetic experiments. Surface area, Bulk and real density, and porosity were carried out for the activated carbon.
Batch Experiments of pH (2.5-8.5) and initial concentration (5-100) mg/l were carried out for single solution for each dye. Experiments of adsorbent dosage effect (0.1-1)g per 100 ml were studied as a variable to evaluate uptake% and adsorption capacity for single dyes(5, 10) ppm, binary and ternary (10) ppm of mixture solutions solution of dyes. Langmuir, and Freundlich, models were used as Equilibrium isotherm models for single solution. Extended Langmuir and Freun
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration,
Four samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,
... Show More
