This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.
The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreTo ascertain the stability or instability of time series, three versions of the model proposed by Dickie-Voller were used in this paper. The aim of this study is to explain the extent of the impact of some economic variables such as the supply of money, gross domestic product, national income, after reaching the stability of these variables. The results show that the variable money supply, the GDP variable, and the exchange rate variable were all stable at the level of the first difference in the time series. This means that the series is an integrated first-class series. Hence, the gross fixed capital formation variable, the variable national income, and the variable interest rate
... Show MoreThe production function forms one of the techniques used in evaluation the production the process for any establishment or company, and to explain the importance of contribution of element from the independent variable and it's affect on the dependent variable. Then knowing the elements which are significant or non-significant on the dependent variable.
So the importance of this study come from estimating the Cobb-Douglas production function for Al- Mansoor General Company for Engineering industries in Iraq during the period (1989-2001)
To explain the importance which effects the independent variable such as
(N
Toxic dyes are commonly discharged into waste waters and dyes are extensively used in the textile industry so it is necessary to find out efficient and eco-friendly method for treating waste waters resulting from industrial effluences. To achieve this aim the fungus Trichoderma sp. is employed into two lines: first line was self – immobilized fungal pellets in (Czapek – Dox medium) to adsorbs two dyes crystal violet, congo red by concentrations 0.01, 0.02, 0.03, 0.04, 0.05, 0.06 mg/L to both dyes, PH 2, room temperature with shaker in ( hrs.2,hrs.4,hrs.24) , by Uv- Visible spectrum . the removal efficiency of 0.05 mg/L crystal violet by Trichoderma sp was 96%. but there was no remova
... Show MoreThe main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreRepresents a supervisory and oversight role of the Central Bank towards finding a sober banking sector, as the procedures , regulations and laws that the Central Bank insists on its implementation with the utmost precision, and that was to protect depositors and shareholders' class basis rights, but it is in the interest of the bank in the end, as it seeks to improve the performance of commercial banks and vaccinated against falling into the blunders, they also contribute to building a sober and stable banking sector and security contributes to the welfare and employment optimization of economic resources, and treatment of research (and the presence of banks decline in financial performance, according to financial performance indic
... Show MoreThis study investigates the elimination of chemical oxygen demand (COD) from an Iraqi petroleum refinery effluent through a combined electro‐Fenton and adsorption process (EF+AC). Response surface methodology (RSM) with a Box–Behnken design (BBD) was employed to investigate the effects of FeSO 4 concentration, current density, and electrolysis time on the reduction of COD using the EF technique. According to the results of the analysis of variance (ANOVA) for the EF technique, FeSO 4 concentrations, with a contribution of 40.06%, and cur
Slag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid waste according to the European Catalogue for Hazardous Wastes. Hence, recovery of aluminum not only saves the environment, but also has advantages of financial and economic returns. In this research, aluminum was recovered and purified from the industrial wastes generated as waste from both of State Company for Electrical and Electronic Industries (Baghdad/AlWaziriya) and General Company for Mechanical Industries (Babylon/-Al-Escandria). It was found that these wastes contain tiny proportions of other elements such as iron, copper, nickel, titanium, lead, and potassium. Wastes were
... Show MoreVarious nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essen
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More