Summary of the research : Our research tagged (Arabic language in the media between warning and development) attempts to follow the most prominent phenomena that accompanied the evolution of the use of Arabic language in the media with the development of these means and spread technically globally, and how divided researchers and linguists and intellectuals Arabs into two teams, each demanding what contradicts the other, in the matter The use of the Arabic language in the media, and the arguments of each team in the need to deal with the media as one of the pillars of the nation culturally, historically and civilized, in order to enhance its position and maintain unity, continued the research highlighted the positions of hard-lin
... Show MoreSeeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.
The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati
Concentrated research topic in the study of key variables in the work of the inspectors general offices , which are in the application of quality management standards audit work and reduce the incidence of corruption. It highlights the importance of current research in being a serious attempt aimed at highlighting the role of the importance of standards of quality management audit work , because they represent a router and leader of the accountant or ( Sergeant ) in the performance of his work and the extent of compliance with these standards , as well as highlight the role of quality audit in reducing the incidence of corruption , of during the professional performance of Higher auditors and determine the responsibilities entrus
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More