In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreAbstract A descriptive study was carried out on nurses who were working at burn. Units in Baghdad city hospitals, Al-Kindy , Al-Yarmook, Al-Qadisiya, Al-karkh, and Al-Karama hospital, in the period from 20th july 2003 to 20th November 2003. The study aimed to identify the nurses performance about pain management for burned patients at burn units and find out the relationship between the demographic characteristics and performance . A purposive (non-probability) sample of (40) nurses, (24) male nurses and (16) female. The data were collected through the use of observational checklist, which comprised (
Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreElastic magnetic electron scattering form factors in Ca-41 have been investigated. 1f7/2 subshell has been adopted as a model space with one neutron, and Millinar, Baymann and Zamick 1f7/2 model space effective interaction (F7MBZ) has been used as a model space effective interaction to generate the model space vectors for the M1, M3, M5, M7, and total form factors. Discarded space (core and higher configuration orbits) have been included through the first order perturbation theory to couple the partice-hole pair of excitation with 2ћω excitation energy in the calculation of the form factors and regarding the realistic interaction density dependence M3Y as a core polarization interaction with five sets of modern fitting parameters. Fina
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreBackground: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed
... Show MorePolycystic ovary syndrome(PCOS) is a heterogeneous disorder of uncertain etiology , it is the most common endocrinopathy in women and most common cause of anovulatery infertility ,characterized by chronic anovulation and hyperandrogenemia .The present study was designed to investigate the effect of silymarin which is known to have antioxidant and insulin sensitivity effects on the levels of glucose, insulin ,testosterone ,leutinizing hormone(LH) and progesterone .Ovulation rate and Homeostasis Model Assessment of insulin Resistance (HOMA) ratio were determined .A 3-months of treatment were conducted in 60 PCOS patients in three well-matched groups .The first one (n=20),received silymarin(750mg/day) .The second group received
... Show MoreThe environmental problems that have emerged recently as a result of pressure on the environment due to the increase in population size, especially in urban cities, where this increase was accompanied by the need for housing as well as the need for services and activities. This led to the establishment of many vertical residential buildings represented by residential complexes within the urban fabric of the city of Baghdad. As part of following the methodology of urban dictation policies in empty areas, and to accommodate the largest number of residents as a result of the multiplicity of floors and housing, these buildings must be subject to the standards and requirements of sustainability at the level of their spatial location and their
... Show More