In recent years, there is more interest in water sources availability, including groundwater due to an increase in demand for water because of the increasing population in the world, and the water recedes due to climate change also. Therefore, the study of groundwater has required more attention. The aim of the present study is to establish a MODFLOW model in the groundwater modeling system software to simulate the movement of groundwater in the Turssaq alluvial fan which is located in the Qazaniyah city, east of Diyala Governorate. The solid model was used to define the aquifer in the study area. Using the GIS software, mapping and preparing the data needed to create a conceptual model were carried out. The data of the
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreCultural and identity scars have been engraved in the body of ethnic minority of Muslims in America due to the bloody attacks of 9/11. These events have created thus traumatic experiences on the party who witnessed the events at close and the people on whom the blame is conclusively directed, Muslim Americans. For Americans, the attacks resulted in a proud reassertion of the national virtue and communal integrity from which Muslim Americans were excluded. This reassertion is accompanied for Muslims by a reconstruction of a cultural identity away from their origin homeland and under pressures and prejudices that made the process of reconstruction to be severely challenging. Accordingly, the challenge needed to be portrayed to overcome the d
... Show MoreThis research is carried out to investigate the behavior of self-compacting concrete (SCC) two-way slabs with central square opening under uniformly distributed loads. The experimental part of this research is based on casting and testing six SCC simply supported square slabs having the same dimentions and reinforcement. One of these slabs was cast without opening as a control slab. While, the other five slabs having opening ratios (OR) of 2.78%, 6.25%, 11.11%, 17.36% and 25.00%. From the experimental results it is found that the maximum percentage decrease in cracking and ultimate uniform loads were 31.82% and 12.17% compared to control slab for opening ratios (OR
... Show MoreAbstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin
... Show MoreThis paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.
The first approach attains a performance index
... Show MoreThe musical sign was associated with the first appearances of acting that are based on human gestures and expressive and silent movements, and they contributed in accentuating and clarifying these gestures and explain their meanings and indications, and they remained with them until these gestures turned into artistic theatrical shows so that the musical sign would have many functions and constitute the main pillars for this kind of show.
The musical sign is a language not much different than the human language in the semiotic analysis. There has been an increased interest in it and its use in the mime shows by the graduates who realized its necessity and significance in the pantomime show intellectually, artistically and aesthetical
Objective: To assess the impact of a social support for pregnant women upon their pregnancy outcome Methodology: A descriptive purposive study was used to assess the impact of a social support on their pregnancy outcomes. The study was conducted from (22 \ September \ 2020 to 15 \ February \ 2021). A non-probability sample (purposive sample) was selected from 100 women. Data were collected through an interview with the mother in the counseling clinic, during the third trimester of pregnancy, as well as after childbirth in the labor wards to assess the outcome of pregnancy. Data were analyzed through descriptive statistics (frequency and percentages). Results: The most important thing observed in this study was the positive pregnancy outcome
... Show MoreAA Noaimi, BM Fadheel, Saudi medical journal, 2008 - Cited by 25