'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
The dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of
... Show Moreأن لعبة كرة السلة في تقدم وتطور مستمر حالها في ذلك حال الألعاب الرياضية الأخرى حيث أن الفضل في ذلك يعود إلى المعرفة بالعلوم المختلفة وكذلك البحث العلمي من اجل تحقيق نتائج متقدمة تنشدها معظم الدول ومنها العراق على الصعيد المحلي والعربي والدولي. ومما لاشك فيه أن متطلبات تطور مستوى نتائج القدرات البدنية في أيُة لعبة مرتبطة بالبرمجة والتخطيط الصحيح للمناهج التدريبية إذ تقودنا هذه الحقيقة إلى إجراء المزيد من الا
... Show MoreThis research addresses the necessity due to the scarcity of historical studies in the field of sports, especially those indicating the activities and achievements of Arab countries in the Paralympic movement. This study aims to document the participation of Arab countries in the Paralympic Games, explore the prominent sports in which Arab athletes with disabilities participated, and analyze their achievements during the Paralympic Games from 2004 to 2012. The research methodology adopted an analytical, historical approach, collecting and analyzing data objectively through the official website of the International Paralympic Committee, in addition to scientific and historical sources from research papers, journals, and websites. The key fi
... Show MoreEngineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public a
... Show MoreKeys for 22 species representing ten genera Thripidae collection carried out during 1999-2001 in different localities in the middle of Iraq. Of them four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another thirteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.); Microcephalothrips abdominils (Crawford); Scolothrips pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Mar
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreIn this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.