The covid-19 global pandemic has influenced the day-to-day lives of people across the world. One consequence of this has been significant distortion to the subjective speed at which people feel like time is passing. To date, temporal distortions during covid-19 have mainly been studied in Europe. The current study therefore sought to explore experiences of the passage of time in Iraq. An online questionnaire was used to explore the passage of time during the day, week and the 11 months since the first period of covid-19 restrictions were imposed in Iraq. The questionnaire also measured affective and demographic factors, and task-load. The results showed that distortions to the passage of time were widespread in Iraq. Participants consistently reported a slowing of the passage of time for the day and the week during the pandemic in comparison to normal (i.e. before the pandemic). Participants also reported that it felt like longer than 11-months since the first lockdown began. The passage of time during the day and week were not predicted by any demographic, affective or task-load measures taken in the study. The perceived length of time since the first lockdown was however predicted by stress and change of life due to covid, with greater stress and greater change of life being associated with greater subjective lengthening of the pandemic. The findings indicate that whilst distortions to the passage of time during covid-19 appear to be a global phenomenon, the factors which predict temporal experience during the pandemic differ between countries and cultures.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show Morein this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Reflect the sustainable development of the interaction of three key elements are the economic component and the social component and the environmental component while focusing economic component to achieve economic growth and focuses social element to achieve social justice in the distribution of income and achieve prosperity, the environmental component related fields and including emphasizes the protection of the environment and to ensure the continuation and sustainability of resources physical, biological and form in which it believes the interaction required for development process real and effective and sustainable, and is considered the province of Kurdistan Iraq of important areas where the movement of developmental mount
... Show MoreInternet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT
... Show MoreMost pathological effects of lead on the body are due to ability of lead to bind with important cellular molecules of various tissues and organs leading to formation abnormal molecules and thus to emergence of pathological conditions. To evaluation the risk to the health status of Iraqi workers who work in the batteries industry, expression of three types of calmodulin related genes were examined. Blood samples were collected from worker working in Iraqi industry of batteries (located in Al-Waziriya), then RNAs extraction were done thereby gene expression for Calcium/Calmodulin- dependent protein kinase2 (CaMKK2), C-X-C Chemokine receptor 4 (CXCR4) and mitogen activated protein kinase kinase 6 (MAP2K6) was done for each sample by using RT-q
... Show MoreThis study aims to identify the role of forensic accounting in the Iraqi environment, banking stability, and to achieve this goal, we used the field survey method, as it is the most appropriate for studying the phenomenon in question and achieving its objectives.
Where we selected a sample consisting of (50) male and female employees, distributed among five private banks in Baghdad governorate, namely (Ashur International Bank, Development Investment Bank, Iraqi Middle East Investment Bank, Hammurabi Commercial Bank, Khaleej Commercial Bank), and the questionnaire tool was applied to them Designed for this purpose, which consisted of
... Show MoreFive sites were chosen to the north of Babil Governorate in order to identify the limnological features and the impact of the Hindiya Dam during 2019. Site2 was located near the dam to reflect the ecological features of this site, whereas other sites, S1 was located at the upstream of the dam as a control site. Moreover, the two other sites S3 and S4 were located down the dam. The results of the study showed a close correlation between air and water temperature at all sites. Also there were significant differences in average of thirteen out of eighteen water parameters.Water temperature, total alkalinity, bicarbonate, DO, POS, TH and Mg+2 ions decreased from 22.76˚C, 203.33 mg/L,
... Show More