The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
In this paper an atmometer apparatus were used in the greenhouses for estimating reference evapotranspiration values. Experimental work was conducted in the agriculture research center in the College of Agriculture-University of Baghdad west of the city of Baghdad. One atmometer was used in eggplant greenhouse and in cucumber greenhouse through the winter growing season 2013-2014. FAO Penman-Monteith equation was applied outside the greenhouse and used only 65% from the value of ETo in the greenhouses for estimating the reference evapotranspiration in the greenhouse. Moreover, Penman-Monteith equation was applied in greenhouses for the evaluating the performance of the atmometer. The results show that the erro
... Show MorePower switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreThe scientific studies that deal with Herminutia (interpretation) as the art of reading the interpretation practiced by the recipient after his understanding of the literary texts and works of art that he sees or read them so that these readings to make the act of reading and allow him the opportunity to mature and rational reflection of each text or artistic work.
Based on this, the researchers considered the establishment of the problem of their research through the search for the problematic overlap of concepts in the interpretive practices of the literary text?
The second chapter dealt with the definition of the term interpretation as well as interpretation as a theory and concept, and then the indicators reached by t
... Show MoreFace Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreThe main aim of the research is to identify the impact of the application of IFRS for SMEs on optimizing the utility of information for financial reports. To answer the questions and test the hypotheses of the research, researchers relied on the descriptive analytical approach. First, the researchers clarified the theoretical aspect through previous studies, and then they analyses d the results of the applied study by testing the hypothesis using the SPSS.
A questionnaire was distributed after evaluation and arbitration by a number of specialists on selected sample. The sample of 120 respondents consists of general managers, department directors, head of departments, accountants, auditors and financial controllers working in the
... Show MoreGlobally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati
... Show MoreThe adsorption of copper ions onto produced activated carbon from banana peels (with particle size 250 µm) in a single component system with applying magnetic field has been studied using fixed bed adsorber. The fixed bed breakthrough curves for the copper ions were investigated. The adsorption capacity for Cu (II) was investigated. It was found that 1) the exposure distance (E.D) and strength of magnetic field (B), affected the degree of adsorption; and 2) experiments showed that removal of Cu ions and accumulative adsorption capacity of adsorbent increase as the exposure distance and strength of magnetic field increase.
The study aimed to identify the reality of the application of the organizational equity empowerment at the Jordanian government institutions from the viewpoint of women employees in terms of each of the (delegation equity, training equity, appraisal equity, join in committees equity, participation in decision-making equity), and the impact of non-application of equity empowerment on performance.
Population of the study amounted (986) women employee, while the researcher distributed (340) questionnaire through a randomly sample method.
The study used the questionnaire as a tool to collect the data. And to ensure the reliability of the questionnaire has been calculated Cronbach's co
... Show More