In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
Aim: This study aimed to compare different types of ligation methods to obtain maximum tooth movement with the least undesirable rotation. Methods: Titanium brackets bonded to acrylic canine teeth were ligated to straight stainless steel (SS) archwires using four ligation methods (figure-O and figure-8 elastics, SS ligatures, and Leone Slide ligatures). The teeth with the ligatures in place were stored in a water bath at 37ºC for 1 day, 1 week, 2, 4 or 6 weeks before testing. The teeth were retracted through softened wax along the archwire and the amount of tooth movement and degree of rotation were measured. Results: Slide ligatures showed the highest distance of tooth movement and degree of canine rotation followed by figure-O elastics
... Show MoreThe objective of this study is to investigate the application of advanced oxidation processes (AOPs) in the treatment of wastewater contaminated with furfural. The AOPs investigated is the homogeneous photo-Fenton (UV/H2O2/Fe+2) process. The experiments were conducted by using cylindrical stainless steel batch photo-reactor. The influence of different variables: initial concentration of H2O2 (300-1300mg/L), Fe+2(20-70mg/L), pH(2-7) and initial concentration of furfural (50-300 mg/L) and their relationship with the mineralization efficiency were studied.
Complete mineralization for the system UV/H2O2/Fe+2 was achieved at: initi
... Show MoreIraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.
Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to
... Show More
Cressa cretica (Shuwwayl) is a halophytic that belongs to Convolvulaceae, naturally grown in the Middle East including Iraq. Traditionally the plant is used as a paste for sore treatment, also it is used for fever, jaundice, and other illness. Regarding nonclinical use it is used as goat, sheep, and camel feed also as an oil source. Flavonoids including quercetin, kamepferol, apigenin, and their glycosides, phenolic acid as chlorogenic acid, and phytosterols mainly ?–sitosterol were the most important phytochemicals that were detected in this halophyte. Crude ethanolic, methanolic extracts and ethyl acetate fraction of the areal parts were used in clinical studies and demonstrated various effe
... Show MoreSeventy five adult virgin female Norway rats (60 experimental and 15 controls) were used toevaluate the effect of seeds of three herbs (Fennel, Cumin and Garden cress) on their mammaryglands. Experimental animals were fed with these herbs (each type of herb seeds was given to twentyexperimental rats) for fourteen days. Rats were sacrificed and mammary gland sections wereobtained, stained then morphometrically assessed. Serum prolactin level was performed too.Results revealed that Garden cress seeds are the strongest lactogenic agent among the three. BothFennel and Cumin seeds were shown to be very weak galactagogues.
Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perin
... Show MoreIn This paper, we introduce the associated graphs of commutative KU-algebra. Firstly, we define the KU-graph which is determined by all the elements of commutative KU-algebra as vertices. Secondly, the graph of equivalence classes of commutative KU-algebra is studied and several examples are presented. Also, by using the definition of graph folding, we prove that the graph of equivalence classes and the graph folding of commutative KU-algebra are the same, where the graph is complete bipartite graph.
يهتم هذا البحث بدراسة الأجوبة المسكتة,وهي أجوبة سريعة وحاسمة تقطع حجة الخصم وتفحمه وتغلقالحوار.وقد أرتكز البحث على منهجية تداولية تنظرإلى فاعلية الجواب المسكت في المحاورة وإنهائها من زواياإنجازية و حجاجية.وقد تكون البحث من ديباجة ممهدةوثلاثة مباحث.وسلطتالديباجةالممهدةالضوء علىمفهومالجواب المسكتوشيوعهفي كتب الأدبوالأخبارونوادر الكلاموكيف يمكن النظر لهبوصفه وحدة حوارية تنبنيمنها المحادثة؟أما المبحث ا
... Show MoreIn the present paper, discuss the concept of fuzzy topological spectrum of a bounded commutative KU-algebra and study some of the characteristics of this topology. Also, we show that the fuzzy topological spectrum of this structure is compact and T1 -space.