This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.
Regulatory T (Treg) cells are one of the major immunosuppressive cell types in cancer and a potential target for immunotherapy, but targeting tumor-infiltrating (TI) Treg cells has been challenging. Here, using single-cell RNA sequencing of immune cells from renal clear cell carcinoma (ccRCC) patients, we identify two distinct transcriptional fates for TI Treg cells, Fate-1 and Fate-2. The Fate-1 signature is associated with a poorer prognosis in ccRCC and several other solid cancers. CD177, a cell surface protein normally expressed on neutrophil, is specifically expressed on Fate-1 TI Treg cells in several solid cancer types, but not on other TI or peripheral Treg cells. Mechanistically, blocking CD
This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreActivated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.
The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased with adsorbent mass increasing. The maximum removal value of sulfate at different pH experiments is (43%) at pH=7.
This paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
Basically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta
... Show MoreIn this paper, the Mars orbital elements were calculated. These orbital elements—the major axis, the inclination (i), the longitude of the ascending node (W), the argument of the perigee (w), and the eccentricity (e)—are essential to knowing the size and shape of Mars' orbit. The quick basic program was used to calculate the orbital elements and distance of Mars from the Earth from 25/5/1950 over 10000 days. These were calculated using the empirical formula of Meeus, which depended on the Julian date, which slightly changed for 10000 days; Kepler's equation was solved to find Mars' position and its distance from the Sun. The ecliptic and equatorial coordinates of Mars were calculated. The distance between Mars and the center of the E
... Show More