This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
Abstract:
The issues related to foreign trade is a broad field for discussions and captures the interest of economists for their contribution to the process of economic development in the economies of the countries, especially developing ones. The imports of goods and services in foreign trade constitute an important part of the local by which the economy gets goods and services that the economy cannot produce because of the incompetent base of production. Further, the demand function of imports occupied a good deal of the attention of researchers in the field of international economics for which agricultural imports constitute an important part. The reason for the interest in the subject is due to its im
... Show MoreIN this work, a titanium dental implant was modified by electro-polymerized of 4-allyl-2-methoxyphenol (Eugenol) using direct current lower than 3.5 volt. The modification of titanium dental implant was achieved to improve its corrosion resistant. Fourier transform infrared spectroscopy (FTIR) was employed to confirm the electro-polymerization of Eugenol to Poly Eugenol (PE) on pure titanium. Deposition of PE on titanium was confirmed by X-ray diffraction and was characterized by thermogravimetric analysis (TGA). The surface morphology of polymeric film were examined through scanning electron microscopy (SEM). Coated titanium by (PE) revealed a good corrosion protection efficiency even at temperature ranged (293-323)K in artificial saliva.
... Show MoreThe polymer was used to inhibit the corrosion of copper metal in salt media in different concentrations at room temperature using potentiometric polarization measurement. The polymer was prepared by mixing (0.1 M) 4-Hydroxy aniline (C6H7NO) with (0.25M) of ammonium persulfate as the initiator using the electro-deposition technique. The polymer’s results showed that copper in (3.5%) NaCl had good corrosion resistance. The findings demonstrate that the %IE for polymer-induced copper corrosion is 89.32% at 10 ppm concentration as a result of the 4-hydroxy aniline polymer’s adsorption from salt solution on the surface of copper metal. The numbers from the polarization method and the acquired standard data agree well. The coated copper by po
... Show MoreThe polymer was used to inhibit the corrosion of copper metal in salt media in di erent concentrations at room temperature using potentiometric polarization measurement. The polymer was prepared by mixing (0.1 M) 4-Hydroxy aniline (C6H7NO) with (0.25M) of ammonium persulfate as the initiator using the electro-deposition technique. The polymer’s results showed that copper in (3.5%) NaCl had good corrosion resistance. The ndings demonstrate that the %IE for polymer-induced copper corrosion is 89.32% at 10 ppm concentration as a result of the 4-hydroxy aniline polymer’s adsorption from salt solution on the surface of copper metal. The numbers from the polarization method and the acquired standard data agree well. The coated copper by poly
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreThe development in the presentation and presentation of the service in order to distinguish them from the same, was one of the most important reasons to choose the current issue to upgrade the level of service, especially in the Iraqi restaurant sector, which has become today of the important sectors successful. The problem of research was to try to answer a range of questions: to what extent are Iraqi restaurants interested in physical service factors? Do Iraqi restaurants apply physical factors in a way that leads to customer satisfaction? Are Iraqi restaurants interested in the satisfaction of their customers? The objective of the current research is to try to determine the extent to which the
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreAbstract:
Since the railway transport sector is very important in many countries of the world, we have tried through this research to study the production function of this sector and to indicate the level of productivity under which it operates.
It was found through the estimation and analysis of the production function Kub - Duglas that the railway transport sector in Iraq suffers from a decline in the level of productivity, which was reflected in the deterioration of the level of services provided for the transport of passengers and goods. This led to the loss of the sector of importance in supporting the national economy and the reluctance of most passengers an
... Show MoreOrganofluorines, as a pollutant, belongs to a group of substances which are very difficult to neutralize. They are part of many products of everyday use and for this reason they pollute the environment in large quantities. Perfluorinated carboxylic acids are entered into the list of the “Stockholm Convention on Persistent Organic Pollutants” in order to minimize the load on the environment by significantly reducing their use, up to their complete rejection. The DD4 strain was isolated from the soil by the enrichment method and identified using 16S rRNA method as Pseudomonas plecoglossicida. It is able to metabolize perfluorooctanoic acid (PFOA) as the only carbon source in Raymond nutrient medium with a concentration of 1000
... Show More