Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreHysterectomy is one of the most common gynecological operations done worldwide. Early diagnosis of the psychosexual effects of a hysterectomy and the fast application of appropriate treatment can prevent further worsening and persistence of symptoms, especially with respect to higher levels of anxiety, depression, lower self-esteem, and sexual impact after a hysterectomy. The aim of this study was to assess the psychological and sexual problems of women with hysterectomy. A descriptive study was carried out from March 1, 2023 to May 25, 2023 to determine the level of psychosexual problems experienced by women after hysterectomy. A purposive (non-probability) sample of 120 women who visited the outpatient clinic at Baghdad Teaching H
... Show MoreThe rehabilitation of deteriorated pavements using Asphalt Concrete (AC) overlays consistently confronts the reflection cracking challenge, where inherent cracks and joints from an existing pavement layer are mirrored in the new overlay. To address this issue, the current study evaluates the effectiveness of Engineered Cementitious Composite (ECC) and geotextile fabric as mitigation strategies. ECC, characterized by its tensile ductility, fracture resistance, and high deformation capacity, was examined in interlayer thicknesses of 7, 12, and 17 mm. Additionally, the impact of geotextile fabric positioning at the base and at 1/3 depth of the AC specimen was explored. Utilizing the Overlay Testing Machine (OTM) for evaluations, the research d
... Show MoreBackground Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.
Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.
Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreThis work analyzes the effectiveness of an artificial intelligence (AI) community- building workshop designed for high school teachers and it focuses on contemporary issues related to AI concepts and applications. A group of high school teachers from local education districts attended a one-day AI hands-on workshop at our university. The workshop included several AI-related topics and hands-on examples and exercises aiming to introduce AI concepts and tools relevant to pre-college education. The participating teachers were expected to become a part of a collaborative network created to design, develop, and implement novel AI learning modules for high school students. Initial and a post-training surveys have been used to measure the
... Show MoreCalcifying epithelial odontogenic tumour (CEOT) is a benign odontogenic neoplasm of epithelial origin that secretes an amyloid‐like protein tending towards calcification. This study aims to describe a case series from Iraq of one of the rarest odontogenic tumours.
Clinical and histopathological analysis of Calcifying epithelial odontogenic tumour cases that are archived at the oral pathology laboratory of the college of dentistry (Baghdad University) from 2000 to 2019.
Six cases of CEOT were regi
Cholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.
This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).
In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show More