The irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.
As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i
... Show MoreIn light of crises, the need for efficient and flexible public administrations to make quick and decisive decisions, also institutions capable of directing the internal elements and components of them and adapting them to the requirements of rapid change due to crises and disasters, which led to scarce resources becoming scarcer and economic, political and social problems becomes more prominent. For the majority of developing countries, including Iraq, the increasing need for the importance of moving towards enhancing the efficiency of the performance of public institutions while trying to predict their future, can only be achieved. Through solid mechanisms and principles of governance that enhance the ability of institutions and make them
... Show MoreBackground: Tooth decay is still one of most common diseases of childhood, child’s primary teeth are important even though they aretemporary. This study was conducted to assess the physiochemical characteristic of saliva among caries experience preschool children and compared them with caries free matching in age and gender. Then an evaluation was done about these salivary characteristics to dental caries and evaluated the relation of body mass index to dental caries and to salivary variables. Materials and method: After examination 360 children aged 4-5 years of both gender. Caries-experiences was recorded according to dmfs index by (World Health Organization criteria 1987) during pilot study children with caries experience was di
... Show MoreObjectives: The purpose of this in vitro study was to compare the effect of adding a poloxamer surfactant to the irrigant solutions on its cleaning efficiency. Design: In this study the roots of extracted permanent premolar teeth were used and evaluated by using Scanning Electronic Microscopy (SEM). Materials and Method: 72 human single tooth of permanent premolar (8 for each group) were used in this in vitro study. Roots after sectioning at cervical area to get 15 mm were embedded in a plastic container filled with impression silicon, then instrumented with ProTaper rotary instruments till size F4. Each group (8 root) were irrigated with one of the nine solutions used in study: three concentrations of NaOH [5% (A1), 2.5%(A2), 0.5%(A3)], th
... Show MoreThe azo dye brilliant reactive red K-2BP (λmax = 534 nm) is widely used for coloring textiles because of its low-cost and tolerance fastness properties. Wastewaters treatment that contains the dye by conventional ways is usually inadequate due to its resistance to biological and chemical degradation. During this study, the continuous reactor of an advanced oxidation method supported the use of H2O2/sunlight, H2O2/UV, H2O2/TiO2/sunlight, and H2O2/TiO2/UV for decolorization of brilliant reactive red dye from the effluent. The existence of an optimum pH, H2O2 concentration, TiO2 concentration, and d
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More