The electoral mechanism is remarkably clear, a political tool for institutional construction, directing political life, forming the political scene, and forming the partisan scene. This process was through the design of electoral laws, as elections in Tunisian political history represented the indicator of its slow and accelerated transformations, so The elections in Tunisia usually coincide with important political stages, accompanied by legislative or constitutional amendments in general, Islamic or secular forces have played a fundamental role in promoting the democratic experience and the principle of the peaceful transfer of power. This led to the formation of a national consensus that would help the country not enter into political
... Show MoreObjective: The approximate life span of a silicone maxillofacial prosthesis is as short as1.5–2 years of clinical service, then a new prosthesis should be fabricated. The most common reasonfor re-making the prosthesis is silicone mechanical properties degradation. The aim of this studywas to assess some mechanical properties of VST-30 silicone for maxillofacial prostheses after addi-tion of intrinsic pigments.Methods: Two types of intrinsic pigments (rayon flocking and burnt sienna); each of them wasincorporated into silicone. One hundred and twenty samples were prepared and split into 4 groupsaccording to the conducted tests (tear strength, hardness, surface roughness, and tensile strengthand elongation percentage) with 30 samples for ea
... Show MoreThe study was conducted to assess the attitude and awareness of a sample of people regarding the indiscriminate slaughter and its effects on health and the environment compared with slaughtering in a slaughterhouse. The sample consisted of 120 persons from six equal professional groups contacted with the butchery labour (livestock keeper, truck driver, butcher, veterinarian, shopkeeper and consumer). The age ranged 22-76 years old, mean 52±10 years, lived ≥ 5 years in the Baghdad city. The results showed that there is a preference for slaughtering inside the slaughterhouse due to the presence of veterinary examination, slaughtering and preparing meat in a healthy, easy-to-clean places, unlike the indiscriminate sla
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show More