Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these functions theoretically and then measure them statistically among a sample of students of the American University of Madaba within their social relations of family, friends and colleagues. The study found a set of results, the most important of which are: (1) The above functions range from high to medium, the highest being reinforcement, followed by protection, then occupation, then social dimension, then understanding, and finally values.
A Multiple System Biometric System Based on ECG Data
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe purpose of the theme of redesign of jobs one of the topics the task that offers the possibility for individuals to perform several tasks in the organization of health at the same time gain experience and diverse skills and achieve compatibility between the requirements of the most appropriate function and organization of the hand ,hence, the idea of studying the redesign of jobs of the division of blood transfusion services in the department of health Baghdad Rusafa to change the conventional methods used in the performance of functions ,which are no longer able to meet the needs of patients where blood transfusion is a key ingredient in health care and equal access to safe blood is needed
... Show MoreThe concern of this article is the calculation of an upper bound of second Hankel determinant for the subclasses of functions defined by Al-Oboudi differential operator in the unit disc. To study special cases of the results of this article, we give particular values to the parameters A, B and λ
Abstract Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma. This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthmatic patients in Baghdad City. The study com
... Show MoreThe aim of the research is to study the effect of the roundhouse strategy on the achievement of fifth grade secondary school in physics and their pivotal thinking. The experiment has been applied for obtaining the data, which were processed statistically using the Statistical Package for Social Sciences, the results revealed that the students of the experimental group who studied using the roundhouse strategy was superior to the students of the control group who studied in the traditional method in the achievement exam. The results also show that there are statistically significant differences between the mean scores of the students of the experimental group and the control group in the pivotal thinking exam, in favor of the experimental gr
... Show More 
        