Preferred Language
Articles
/
jcoeduw-774
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using dickey _ fuller expanded test for testing variables of investment function in Iraq
...Show More Authors

         To ascertain the stability or instability of time series, three versions of the model proposed by Dickie-Voller were used in this paper. The aim of this study is to explain the extent of the impact of some economic variables such as the supply of money, gross domestic product, national income, after reaching the stability of these variables. The results show that the variable money supply, the GDP variable, and the exchange rate variable were all stable at the level of the first difference in the time series. This means that the series is an integrated first-class series. Hence, the gross fixed capital formation variable, the variable national income, and the variable interest rate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Production Function Analyze For Almansoor General Company For Engineering Industries In Iraq
...Show More Authors

The production function forms one of the techniques used in evaluation the  production the process for any establishment or company, and to explain the importance of contribution of element from the independent variable and it's affect on the dependent variable. Then knowing the elements which are significant or non-significant on the dependent variable.

    So the importance of this study come from estimating the Cobb-Douglas production function for Al- Mansoor General Company for Engineering industries in Iraq during the period (1989-2001)

     To explain the importance which effects the independent variable such as
(N

... Show More
View Publication
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Removing Toxic Dyes from Aqueous Medium by Trichoderma-Graphain Oxide Aerogel
...Show More Authors

Toxic dyes are commonly discharged into waste waters and dyes are extensively used in the textile industry so it is necessary to find out efficient and eco-friendly method for treating waste waters resulting from industrial effluences. To achieve this aim the fungus Trichoderma sp. is employed into two lines: first line was self – immobilized fungal pellets in (Czapek – Dox medium) to adsorbs two dyes crystal violet, congo red by concentrations 0.01, 0.02, 0.03, 0.04, 0.05, 0.06 mg/L to both dyes, PH 2, room temperature with shaker in ( hrs.2,hrs.4,hrs.24) , by Uv- Visible spectrum . the removal efficiency of 0.05 mg/L crystal violet by Trichoderma sp was 96%. but there was no remova

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 08 2024
Journal Name
Engineering, Technology & Applied Science Research
Making Different Topographic Maps with the Surfer Software Package
...Show More Authors

The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The supervisory role of the central bank in the protection of commercial banks: An applied research in the Economy Bank for Investment and Finance
...Show More Authors

Represents a supervisory and oversight role of the Central Bank  towards finding a sober banking sector, as the procedures , regulations and laws that the Central Bank insists on its implementation with the utmost precision, and that was to protect depositors and shareholders' class basis rights, but it is in the interest of the bank in the end, as it seeks to improve the performance of commercial banks and vaccinated against falling into the blunders, they also contribute to building a sober and stable banking sector and security contributes to the welfare and employment optimization of economic resources, and treatment of research (and the presence of banks decline in financial performance, according to financial performance indic

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Water Environment Research
Combining Electro Fenton With Adsorption Processes for Treatment of Petroleum Refinery Wastewater
...Show More Authors
ABSTRACT<p> This study investigates the elimination of chemical oxygen demand (COD) from an Iraqi petroleum refinery effluent through a combined electro‐Fenton and adsorption process (EF+AC). Response surface methodology (RSM) with a Box–Behnken design (BBD) was employed to investigate the effects of FeSO <sub>4</sub> concentration, current density, and electrolysis time on the reduction of COD using the EF technique. According to the results of the analysis of variance (ANOVA) for the EF technique, FeSO <sub>4</sub> concentrations, with a contribution of 40.06%, and cur</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-khwarizmi Engineering Journal
Recovery of Aluminum from Industrial Waste (Slag) by Melting and Electrorefining Processes
...Show More Authors

Slag of aluminum is a residue which results during the melting process of primary and secondary aluminum production. Salt slag of aluminum is hazardous solid waste according to the European Catalogue for Hazardous Wastes. Hence, recovery of aluminum not only saves the environment, but also has advantages of financial and economic returns. In this research, aluminum was recovered and purified from the industrial wastes generated as waste from both of State Company for Electrical and Electronic Industries (Baghdad/AlWaziriya) and General Company for Mechanical Industries (Babylon/-Al-Escandria). It was found that these wastes contain tiny proportions of other elements such as iron, copper, nickel, titanium, lead, and potassium. Wastes were

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 20 1990
Journal Name
المجلة العراقية للعلوم
INACTIVATION OF GENTAMYCIN AND STREPTOMYCIN TOXICITY AGAINST E.COLI BY AMINO ACID SUPPLEMENTATION
...Show More Authors

Various nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essen

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref