Nowadays, the development of laser devices in the medical field has become large and highly efficient compared to regular surgery. The aim of this work is to design a laser technology system to remove and break up blood clots in the human body, especially in the sensitive areas that pose a threat to his life. This system is characterized by being environmentally friendly, has no side effects on the human body, and is economically inexpensive. The program of Matlab 2019 was used to create an executable program to simulate a pulse system for a new model which is Free Electron Laser (FEL) in any range of wavelength and in this work it is in the ultraviolet range and the electrons energy about 450 MeV and wavelength equal 22.5 nm to remove these clots by breaking the bonds connecting the clots components. The energy, which gives this wavelength is among the short wavelengths that approximate in its action from the magnetic resonance. This program consists of Specific parameters which a simulation to obtain the best values for wavelength, exposure time and pulse energy.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreAniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreTrimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More