This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
Abstract: Consumer protection in electronic contracts is of great importance in Iraqi law, as there are detailed legislations that enhance consumer rights and provide mechanisms for compensation when necessary. In Iraq, the Consumer Protection Law of 2010 regulates these rights and ensures the availability of sufficient and clear information to consumers.
Cladosporium sp. plays an important role in human health, it is one of the pathogenic fungi which cause allergy and asthma and most frequently isolated from airborne spores. In this study, a couple of universal PCR primers were designed to identify the pathogenic fungi Cladosporium sp. according to conserved region 5.8S, 18S and 28S subunit ribosomal RNA gene in Cladosporium species. In silico RFLP-PCR were used to identify twenty-four Cladosporium strains. The results showed that the universal primer has the specificity to amplify the conserved region in 24 species as a band in virtual agarose gel. They also showed that the RFLP method is able to identify three Cladosporium spe
... Show MoreIn this paper, the process for finding an approximate solution of nonlinear three-dimensional (3D) Volterra type integral operator equation (N3D-VIOE) in R3 is introduced. The modelling of the majorant function (MF) with the modified Newton method (MNM) is employed to convert N3D-VIOE to the linear 3D Volterra type integral operator equation (L3D-VIOE). The method of trapezoidal rule (TR) and collocation points are utilized to determine the approximate solution of L3D-VIOE by dealing with the linear form of the algebraic system. The existence of the approximate solution and its uniqueness are proved, and illustrative examples are provided to show the accuracy and efficiency of the model.
Mathematical Subject Classificat
... Show MoreThe experimental and theoretical methods were studied for inhibition of the corrosion titanium in HCl by using neomycin sulfate drug. The results of neomycin sulfate drug had good corrosion protection for titanium in hydrochloric acid and the inhibition efficiency (%IE) increasing with increasing concentration of drug because the neomycin sulfate drug had adsorption from acid solution on surface of titanium metal. The program of hyperchem-8.07 was used for theoretical study of the drug by molecular mechanics and semi-empirical calculations. Quantum chemical was studied drug absorption and electron transferred from the drug to the Titanium metal, also inhibition potentials of drug attachment with the (LUMO-HOMO) energy gap,
... Show MoreThis study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law