The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe advancement of science and technology in recent years has led to heavy and diversified production and thus market congestion in various goods and services; which led to an increase of competition among advertisers in order to meet the needs and wishes and to upgrade to the level of consumers. These upgrades have imposed an increase in the usage of the promotions, including advertising in terms of quantity and quality, to influence and persuade customers innovatively and creatively using all available mass media.
The research aims to identify the attitudes of residents of poor areas towards television advertisements for medicines, and the impact of those advertisements on them in terms of making purch
... Show MoreOver application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy
Background: One of the most common problem associated with the used of soft denture lining material is microorganisms and fungal growth especially Candida albicans, which can result in chronic mucosal inflammation. The aim of this study was to evaluate the influence of chlorhexidine diacetate (CDA) salt Incorporation into soft denture lining material on antifungal activity; against Candida albicans, and the amount of chlorhexidine di-acetate salt leached out of soft liner/CDA composite. Furthermore, evaluate shear bond strength and hardness after CDA addition to soft liner Materials and methods: chlorhexidine diacetate salt was added to soft denture lining material at four different concentrations (0.05%, 0.1% and 0.2% by weight). Four hund
... Show MoreBackground Microorganisms and fungal growth especially Candida albicans, on soft denture lining material are the most common problem which can lead to chronic mucosal inflammation. The aim of this study was to evaluate the effect of zirconium nanoparticles into acrylic-based heat cured soft denture lining material against Candida albicans, and the amount of zirconium ion release of soft liner/ZrNPs composite. Furthermore, evaluate shear bond strength after ZrNPs addition to soft liner. Materials and methods: Zirconium nanoparticles were added into acrylic-based soft denture liner in various percentages (1%, and 1.5% by weight). Two hundred and fifty specimens were arranged and isolated into four groups as per the test to be done The antifu
... Show MoreIn this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP
... Show More