Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThis study examines the transformation of political slogans, clichés, and stereotypes in Russia and Iraq during periods of political regime change in the late 20th and early 21st centuries. The main objective of the work is to identify and comparatively analyze the linguistic and cultural changes that accompanied political transformations in both countries. The research is based on theoretical concepts of political myth, framing, and critical discourse analysis. The research methodology includes content analysis of political texts, comparative analysis of linguistic transformations, and analysis of statistical data on cultural consumption. The main hypothesis is that, despite the presence of common trends in linguistic and cultural
... Show MoreThe purpose of this interview study was to explore teachers’ perceptions of Response to Intervention (RtI) implementation in their school. Particularly, the study explored teachers’ knowledge of RtI, teachers’ perceptions of RtI their intervention/instruction in school, and teachers’ suggestions of RtI implementation in their school. The study design was a qualitative interview in nature and data were collected from face-to-face interviews with four teachers in one school. The findings revealed that RtI means to identify students’ problems; the positive teachers’ perceptions of their implementation included: (a) students who demonstrate progress through RtI are those who receive private education services, (b) progress monito
... Show MoreIntroduction: COVID-19 vaccine have been indicated to successfully decrease the hazard for symptomatic severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection furthermore associated hospitalisations. Objective: To study the immune response among different types of SARS-CoV-2 vaccines. Methods: This study includes 100 vaccinated individuals (43 Sinopharm, 30 AstraZeneca and 27 Pfizer) with one or two doses from different health centres in Baghdad. During the period from April 2021 to the end of May 2021, SARS-CoV-2 IgG and SARS-CoV-2 IgM levels were detected using AFIAS-6 device depending on FIA (Fluorescence Immunoassay) technique. Results: 93% of the cases were positive for IgG levels, and negative in 7% case
... Show MoreLipid disorders and cardiovascular disease (CVD) risk are known to be increased in patients with diabetes mellitus. The effects of statins on serum lipid levels are well known; however, previous studies did not compare the effects of statins on serum lipid levels in diabetic patients with non-diabetic patients. To investigate the effects of Atorvastatin on serum lipid profiles in hyperlipidemic patients with type 2 diabetes mellitus in comparison with hyperlipidemic patients without diabetes.This study was conducted on 33 type 2 diabetic patients & 34 non-diabetic patients; their age range was 40-80 years, all of them were hyperlipidemic, who had been administered 10, 20, & 40 mg daily of Atorvastatin and completed a 6-month foll
... Show MoreThe aim for this research is to investigate the effect of inclusion of crack incidence into the 2D numerical model of the masonry units and bonding mortar on the behavior of unreinforced masonry walls supporting a loaded reinforced concrete slab. The finite element method was implemented for the modeling and analysis of unreinforced masonry walls. In this paper, ABAQUS, FE software with implicit solver was used to model and analyze unreinforced masonry walls which are subjected to a vertical load. Detailed Micro Modeling technique was used to model the masonry units, mortar and unit-mortar interface separately. It was found that considering potential pure tensional cracks located vertically in the middle of the mortar and units show
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More