The environment and the placesthat prince Faisal Bin AL-Husein influenced his childhood ,
behaviourand future . his expereence in his early life in leading the battles and
arabRevoluionenriched him . inspite of his short periedand harsh experience of leadersmp.
he gained an experienencein ruling iraqadter 1921 . The Syrian experiencetaught him how to
deal with the strong and establish the government as he beliered in the slogan: independence
is taken not given. He established the consititution and the election . he made a solid
basefeconomy of in his time, Iraq , Iraq be came the country number ( 53) as an
independency country on the third of November 1932 . he died peacefuliy after Iraq's
indepence.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreBackground: Reliable detection the etiological agent of amoebic dysentery and extra-intestinal amoebiasis have Public health importance specially in asymptomatic human and animals, Since the acquisition of pet dogs in the recent period has become widespread in our city. Aim: To give correct perception of infection rate in asymptomatic individuals (human and domestic dogs) for the first aspect and about detection and diagnosis of the pathogenic species of Entamoeba histolytica from another morphologically similar and commensal one using the molecular technique in stool samples of asymptomatic individuals the second aspect. Methods: During the study period from the beginning of September 2020 to the end of February 2021, a total of 95 stool s
... Show MoreThe national pharmaceutical industry is pivotal for both the health sector and the national economy. This study aims to identify determinants of national drug products acceptance. The objectives of this study were to quantitatively measure the level of patient and community pharmacist acceptance of national drug products available in community pharmacies and to qualitatively explore the barriers facing national pharmaceutical companies and investigate the suggested solutions.
This cross-sectional study used an explanatory mixed method design. It was conducted in Baghdad, Iraq from July through October 2018. The stud
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
This study was achieved to investigate the accumulation of some heavy metals included: Cadmium, Lead and Nickel in the tissues (gill, intestine, liver, muscles and skin) of Silurus triostegus Heckel, 1843 (Siluriformes, Siluridae) and its larval stage of the nematode Contracaecum sp. (Rhabditida, Anisakidae). As well as to assess the infection patterns of Contracaecum among S. triostegus specimens which were purchased fresh from the local market in Baghdad. One hundred and nine nematodes specimens in larval stage were recovered from the fish host; the overall prevalence of Contracaecum sp. was 38.6%. The sex of the host was not significantly (P ˃ 0.05) associated with the infection of this nematode.
Results showed that the overall me