The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreA particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)
The integration of AI technologies is revolutionizing various aspects of the apparel and textile industry, from design and manufacturing to customer experience and sustainability. Through the use of artificial intelligence algorithms, workers in the apparel and textile industry can take advantage of a wealth of opportunities for innovation, efficiency and creativity.
The research aims to display the enormous potential of artificial intelligence in the clothing and textile industry through published articles related to the title of the research using the Google Scholar search engine. The research contributes to the development of the cultural thought of researchers, designers, merchants and the consumer with the importance of integ
The research aimed to use HIIT exercises, and to know the effect of HIIT exercises on some physiological and physical indicators of the young badminton players, and to identify the degree of competition anxiety and the performance of some offense skills among the young badminton players. The research community (the young badminton players), the research sample and its selection method (the research sample was chosen by the intentional method (8) badminton player from the Athwari Club), the scientific method (the experimental method with pre and post tests), measurement tools: physiological tests (high and low blood pressure) , pulse, and physical exams (explosive force of arms and legs) and the offense skills and the scale of competit
... Show MoreThe research aimed to use HIIT exercises, and to know the effect of HIIT exercises on some physiological and physical indicators of the young badminton players, and to identify the degree of competition anxiety and the performance of some offense skills among the young badminton players. The research community (the young badminton players), the research sample and its selection method (the research sample was chosen by the intentional method (8) badminton player from the Athwari Club), the scientific method (the experimental method with pre and post tests), measurement tools: physiological tests (high and low blood pressure) , pulse, and physical exams (explosive force of arms and legs) and the offense skills and the scale of competition an
... Show MoreThis study deals with a prominent critical term - poetics - in critical studies as an area related to uncovering the laws of creative and aesthetic discourses (Preaching)، and the various functions that accompany it in literary texts. So، the study employs the pioneers' works of this theory specially the eastern theorists in making a parallel comparing study of the text book of " the Magic and Poetry” by Al-Lisan Al-Din bin Al-Khatib (776 AH). It displays the utility of the concept of poetics in the referred book pointing to the illumination of various functions that، in turn، reflected the
New metal complexes of the ligands 2-benzamido benzothiazole(B1), and 2-actamido benzothiazole(B2) with metal ions Ni(II),and Co(II) were prepared in alcoholic medium. The prepared complexes were characterized by FT-IR and electronic spectroscopy, Magnetic susceptibility, Flame Atomic Absorption technique as well as elemental analysis and conductivity measurement. From the spectral studies, an octahedral monomer structure proposed for Ni(II) complexes, and a tetrahedral monomer structure for Co(II)complexes.Semi-empirical methods (PM3,and ZINDO/1)were carried out to evaluate the heat formation( ?H?f)binding energy(?Eb) and dipole moment(µ)for all metal complexes. Also vibration frequencies, Electrostatic potential, HOMO and LUMO
... Show More