The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreSocio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.
Research summary
Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:
The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.
All these manifestations and others require the nation's wise men
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreRoof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the
... Show MoreBackground: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:
... Show MoreFor small aberrations, the ·suehl' ratio of an . im i'ng syStem
- depends on trne aberration v·ariance. Its· aberration fu.nct1on ·is e:qJanded in terms 9f-l nike polynomials. which are_ oirrh6goilal over a circular apeltitte. Their advane Uejn the f;:l t tbat they call be icl.eritified. witl·c1a:s.sh::aj. abe,ttati{)ns 'balanced to jield minimum varia,.o_q,and
thuS maximum St:rehl t"a;tio. [n r«enr pap-er, we derived Cl<lse4 .fonn or
Zmike polyhotnials that ate orthonormal over "- horizontal rect'angul'ar pupil'. (p.anil.lel to· the >Htxi.es) with ar'€
... Show More