Security Problems in an RFID System
...Show More Authors
The purpose of this research is to identify
the effect of the translation of poetic poem into an artistic picture in the achievement of retention among fifth grade students.
In order to verify the research goal, the first two hypotheses were determined. There are no statistically significant differences between the average scores of the experimental group who study (according to the technical picture) ) And the control group (according to the traditional method of art education) at the level of significance (0,05). The second is that there are no statistically significant differences between the average of the experimental group who study (according to the technical picture) and the control group who study (On According to the trad
Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.
... Show MoreEffects of Ozonated Water on Micro Leakage between Enamel and Fissure Sealants Prepared by Different Etching Technique (An in vitro Study), Baraa M Jabar*, Muna S Khalaf
Abstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreThe current research aimed to study the effect of an exercise program on physical-kinetic intelligence and the skills of dribbling and shooting in basketball among female students. The research community was composed of 102 female students in the second stage of the Physical Education and Sports Sciences College for Girls of Baghdad University, in the academic year 2021-2022. A total of 40 female students were the sample of the study: 20 female students in the control group and 20 female students in the experimental group. After the implementation of the exercise program, there were significant improvements from pre-tests to post tests in the two groups (control and experimental groups), in physical-kinetic intelligenc
... Show MoreBackground: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Resin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This