The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (radius center-end (RCE)) represent the second key. While the diagonal-radius center and the retina vessel's end (diagonal-radius center-end (DRCE)) represent the third key. The results illustrate the process's validity and applicability. Also, improve the time required to decrypt the cipher-text by a brute force attack (BFA) from (4.358e+139) year in the compared technique to (1.3074e+140) year for retina3. The BFA time will increase with increasing the number of retina vessels, as in retina1, 2, and 3, which have 24, 53, and 103 retina vessels.
Ischemic heart disease is a major causes of heart failure. Heart failure patients have predominantly left ventricular dysfunction (systolic or diastolic dysfunction, or both). Acute heart failure is most commonly caused by reduced myocardial contractility, and increased LV stiffness. We performed echocardiography and gated SPECT with Tc99m MIBI within 263 patients and 166 normal individuals. Left ventricular end systolic volume (LVESV), left ventricular end diastolic volume (LVEDV), and left ventricular ejection fraction (LVEF) were measured. For all degrees of ischemia, there was a significant difference between ejection fraction values measured by SPECT and echo
Abstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con
... Show Moreالغرض - تعتمد هذه الدراسة على المنهج الوصفي التحليلي من خلال جمع البيانات اللازمة وتحليلها، كون هذا المنهج يركز على استطلاع الآراء لعينة البحث وتوجهاتها ، وتهدف إلى تطوير نموذج يدرس العلاقة بين خلق المعرفة والبراعة التنظيمية في المصارف الخاصة العراقية والتحقق من صحته تجريبياً. التصميم / المنهجية / المدخل- تم إجراء مسح عبر استمارة استبيان لجمع البيانات من عينة من (113) مدير من مصارف تجارية خاصة بالإضافة إلى ذلك ا
... Show MoreThe electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreThere are many techniques that can be used to estimate the spray quality traits such as the spray coverage, droplet density, droplet count, and droplet diameter. One of the most common techniques is to use water sensitive papers (WSP) as a spray collector on field conditions and analyzing them using several software. However, possible merger of some droplets could occur after they deposit on WSP, and this could affect the accuracy of the results. In this research, image processing technique was used for better estimation of the spray traits, and to overcome the problem of droplet merger. The droplets were classified as non-merged and merged droplets based on their roundness, then the merged droplets were separated based on the average non-m
... Show MoreAlthough a great deal of works has been done on the area of capital structure and dividend policy, there is still insufficient knowledge of how these policies affect stock prices. This shortcoming may have been originated from the separation between both policies when investigating their effect on stock prices. Based on this point, this research adopts a new technique (completely randomized design), to combine the effect of capital structure and dividend policy on stock prices rather than separating between them. The study used panel based regression analysis depending on the sample of 30 service and industrial Jordanian firms for the period of 2001-2010. The result of test hypotheses found the following; 1) dividend payout has a
... Show MoreMethotrexate (MTX) is one of the most effective medications to treat rheumatoid arthritis (RA).Aserum of 60 Iraqi male patients suffering from RA as (G1) was newly diagnosis and the same patient in G1 after taking MTX as G2 and 40 Iraqi male healthy control as G3. Nesfatin-1 (Nf-1) is belong to the adipokine family withpleiotropic effect. Nf-1 has been found in different tissues, including stomach, pancreas, bone cells, cartilage and heart. Retinol binding protein (RBP4) was known as transpoter of retinol from its storage sites in the liver to the extrahepatic tissues. Moreover, RBP4 acts as adipokine and contributes in the pathophsyology of prototypic inflammatory disease, rheumatoid arthritis (RA). The results showed a significant increas
... Show MoreTwo field experimسents were conducted in one of the fields of the Agriculture Division of Ain Al-Tamr /Holy Karbala Governorate at two sites of different textures during the agricultural season 2020/2021. The first site has sandy loam texture (gypsum soils). The second site has loamy sand texture (calcareous soils). The factors of the study included: The first factor included two types of soil, gypsum and calcareous soil. The second factor is the tillage systems (no-tillage, spring spike harrows, disc harrows, and mold board plow). The experiment was designed in the two study sites according to the RCBD with three replications. The Valley type center pivot irrigation system was evaluated before planting, three speeds, 30, 50 and 100% of th
... Show MoreIn this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More