On Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.
These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreThe problem of this research is:
What are the sustainable development goals that received the priority in the press addressing of the newspapers under study?
What are the journalistic arts adopted by these newspapers in addressing the sustainable development goals?
What are the journalistic sources that Arab newspapers depended on when addressing the sustainable development goals?
What are the geographic range the Arab newspapers adopted in addressing the sustainable development goals? The research is categorized into descriptive research, adopting the survey method, and using the content analysis method.
The sample of research was determined by the preparation of the Arabic newspapers (Al-
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Abstract
The current research problem includes a variety of research motivations to serve the private health sector, which is witnessing a great competition from internal and external environments. In this regard, private medical clinics are increasingly seeking to attract and retain customers through the quality of their service offerings represented by health services. Innovative and effective marketing methods to improve performance and stay in competition, by relying on the physical evidence of the product as a component of the marketing mix of services and its role in particular in packaging and supporting the health service with concrete evidence that affects the customer an
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe research sought to identify the objective trends of postgraduate students at the College of Political Science - University of Baghdad for the period from 2000-2012 through the objective trends of university theses and dissertations and what are the most and least studied topics, with a re-adjustment of previously studied topics towards topics that serve issues of concern to society and avoiding topics that have been studied a lot to avoid repetition. The research came out with the following results, the most prominent of which are: The total number of what was accomplished in this college is 401 theses and dissertations, and the dissertations had the largest share of them, as their percentage reached 69%, with 275 theses compared to 126
... Show MoreThe search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.
The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification ( ISO 14004 ). The research problem assimilated by these questions:
- What is the level or organization in thinking of environmental system according to ISO 14004 .
- What are the requirements used in researched factor
The study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.