Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe objective of this study is to highlight the skills of office managers and it's impact on the effectiveness of time management in the institutes and faculties of middle technical university and a group of cognitive and practical aims. The managers skills forms mthe modern trend and the main source to provide organizations with highly skilled managers with distinctive performance and because of the sharp changes in the environment which today's organizations works in it , business organizations generally and managers especially realise the importance of time management and it's role in achieving competitive advantage . The problem of this study raised from this point which reflect the extent of departments managers realisation
... Show MoreThe study focuses on the problem that Iraq is approaching an increasing rate of literacy;the available data refers to a rate of (18% -19%). In addition to the fact that the generalcurrent role of the programs directed to literacy is not actually effective enough to limit the expansion of this rate.
The importance of this study highlights the fact that the Iraqi universities are an important tributary among the tributaries of human development, especially in spreading the education of the voluntary work in literacy field and confirming the connection between the students and their society and their role in solving one of the prominent challenges that face the development, i.e., literacy.
<
... Show MoreThis study is one of the descriptive studies, where the researcher used the survey method, which seeks to provide an accurate and appropriate description of the main and sub-categories of the content of the research for television documentaries on the Iraqi satellite channel, relying on the research questions and objectives to analyze the content of the documentaries according to the approach referred to above. The objectives of the research were summarized to identify the function of the documentary programs in Al-Iraqiya channel to detect the crimes of the former regime, to know the frameworks highlighted by the documentary programs in Al-Iraqiya channel to reveal the crimes of the former regime, to identify the extent of the circ
... Show MoreAbstract:
Interest in the topic of prediction has increased in recent years and appeared modern methods such as Artificial Neural Networks models, if these methods are able to learn and adapt self with any model, and does not require assumptions on the nature of the time series. On the other hand, the methods currently used to predict the classic method such as Box-Jenkins may be difficult to diagnose chain and modeling because they assume strict conditions.
... Show More
This study titled “digital addiction and its relationship to social isolation among children in the autism spectrum from the point of view of their parents” in which the
researcher addressed an important topic which is knowledge of digital addiction in a
child with autism spectrum and its relationship to social isolation in them.
The study aimed to dhed the light on the digital addiction in a spectrum child Autism
from the point of view of their parents، by knowing the extent of addiction of children
in the autism spectrum، and identifying the relationship between electronic addiction and the social isolation of children in the autism spectrum.The study presented
several hypotheses،
In this study Isolated Pathogenic bacteria which causes Tonsillitis in Children with ages between 3-17 years. They are admitted to Central Children Hospital (Al-Karch) and Ebn-Albalady Hospital (Al-Rusafa). 200 cases were collected which include 120 Male and 80 Female. The result of the recent study shows that the isolation percentage was 40% from Male and 35% from Female. In this study Fifty six isolated were Identified, 20 were ?-hemolytic Streptococcus which was Streptococcus pyogenes, formed (36%) from all isolated.6 Pathogenic bacteria were ?- hemolytic Streptococcus which was Streptococcus pneumoniae formed (11%). The number of Moraxella catarrhalis bacteria was 12 formed (21%), the number of Haemophilus influenzae was 1
... Show MoreThis study attempts to test the interactive role played by organizational agility in enhancing the effect of organizational anomie on the behavior of planned human resources. The study of organizational anomie has increased because of the moral and legal pressures facing the organization by the external environment within its framework. To adapt to all external developments faced by these organizations, the behavior of human resources planned reflects the ability of individuals to control their behavior in different situations and situations that face them in the work.
The problem of the research indicates that there is a clear lack of understanding of what is meant by the variables studied in the sample
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreAir-conditioning systems (ACs) are essential in hot and humid climates to ensure acceptable ambient air quality as well as thermal comfort for buildings users. It is essential to improve refrigeration system performance without increasing the effects of global warming potential (GWP) and ozone depletion potential (ODP). The main objective of this study is to evaluate the performance of an air conditioning system that operates with a liquid suction heat exchanger (LSHX) through implementing refrigerants with zero OPD and low GWP (i.e., R134a and R1234yf). Liquid suction heat exchanger (LSHX) was added to an automobile air conditioning system (AACS).When Liquid suction heat exchanger was added to the cycle, primary results indicated t
... Show More