In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreNowadays laser in medicine is a rapidly growing field in both researches and applications and many studies have been done in bacteriology against different types of lasers. The effect of the laser depends on many factors, one of the laser factors was the wavelength. The red wavelength band has been considered as a stimulated wavelength for prokaryotic and eukaryotic cells. In this study, three clinical species of Gram-negative bacteria (E. coli, Proteus mirabilis, and Pseudomonas aeruginosa) were exposed to 650 nm band of red region wavelength by a diode laser. The effect of that wavelength appeared on the growth curves for each species along 3 days after laser treatment. The energy density (E.D.) 2.8 J/cm2 gave a positive effect on grow
... Show MoreThe liver is an important organ in the body that can be affected by many drugs and toxins. The hepatotoxins can cause oxidant stress that lead to activation of inflammatory cells and cause liver damage. Drug induced bile duct injuries are related to drug toxicity, multiple drugs have been known to cause the development of liver granulomas. Carbamazepine (CBZ) among other antiepileptic drugs is believed to cause hepatic injury. In this study we investigated the effect of (CBZ) 20mg/kg/day on female mice liver after 14 and 30 days of treatment. The histological findings showed that (CBZ) can cause histological alterations in the liver components such as bile duct proliferation, biliary hypertrophy, ductopenia, inflammatory cells infiltration
... Show MoreImmune-mediated hepatitis is a severe impendence to human health, and no effective treatment is currently available. Therefore, new, safe, low-cost therapies are desperately required. Berbamine (BE), a natural substance obtained primarily from
This c
The purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreReduce the required time for measuring the permeability of clayey soils by using new manufactured cell