The preparatory phase since it corresponds to adolescence are the most important stages of life , where the individual 's personality to take shape at this stage and start asking questions about the same , trying to discover the positive and negative traits hehas in order to form distinctive character and also is being he have Love Poll For everything that goes on around him.
And attention to cognitive motivation is important for students because the student who owns a motive cognitively looking for self - knowledge with conviction, and learning then be meaningful and lasts long. The motive of knowledge are common in which cognitive components does not mean exclusive knowledge on academic books and research in the narrow borders but a
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More
summary of the research
The heart is the pine-shaped flesh on the left side of the chest. The moral gentleness in this flesh is called the home of perception, reason and understanding, as well as the place of desires and passions, so it turns between one desire and another between good and evil. As for its parts, it consists of four main parts called chambers, two rooms on the right As for the two chambers below, it is called the ventricle, the heart works regularly and accurately to pump blood and distribute it to all parts of the body and vital organs. And the Holy Quran divided the types of heart into two main types of healthy hearts, which are types (healthy, hidden, living....)
And the second type is sick hea
... Show MoreBackground: Characterization of the ovarian masses preoperatively is important to inform the surgeon about the possible management strategies. MRI may be of great help in identifying malignant lesion before surgery. Diffusion Weighted Imaging (DWI) is a sensitive method for changes in proton of water mobility caused by pathological alteration of tissue cellularity, cellular membrane integrity, extracellular space perfusion, and fluid viscosity.
Objective: to study the diagnostic accuracy of DWI in differentiation between benign and malignant ovarian masses.
Type of the study:Cross-sectional study.
Methods: this study included 53with complex
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More