The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the changes in the reordering letters or words of the paragraph and text without changing the letters themselves. So, the next step uses one of the error detection methods which is named Hamming Codes to find out the locations of the change in the received text. After that; at the third step, RSA as a primary encryption method has been used to encrypt the keys extracted to the first step and second step in order to prevent the intruders to break down the security of the method.
The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.
The most honorable of science was what was related to the book of God, the Almighty, the Constitution of this nation and the way of its guidance and method of advancement there is no life except for him and safety only by its application and it is no secret to the competent studies of the importance of the subjective studies in the Koranic studies to address issues of great importance enlighten the path of the nation and revive From here comes the importance of the topic covered by the research, which is "Intent in the Holy Quran meanings and semantics", and this topic features features that made it worthy of writing, including the importance of clarifying theories of Qur'anic character of a systematic nature, such as the theory of inten
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreBackground: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswit
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreIn the present research synthesis and study of biological activity a series of new polymers modified of chitosan with compounds containing azo group. Beginning diazonium salt produced from 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine reacted with concentrated HCl acid and sodium nitrite. The coupling reaction between diazonium salt with substituted aromatic aldehyde to produce Azo derivatives )1-6(. Azo Schiff bases Chitosan )7-12( were synthesized by condensation of Chitosan with Azo derivatives )1-6( in ethanol with some drops of glacial acetic acid. The structural modifications of Chitosan ring (linked to a bioactive azo moiety) were expected to give new derivatives )7-12( with a diverse range of biological functions. These compounds' st
... Show MoreThis investigation deals with the use of orange peel (OP) waste as adsorbent for removal of nitrate (NO3) from simulated wastewater. Orange peel prepared in two conditions dried at 60C° (OPD) and burning at 500 °C (OPB). The effect of pH: 2-10, contact time: 30- 180 min, sorbent weight: 0.5- 3.0 g were considered. The optimal pH value for NO3 adsorption was found to be 2.0 for both adsorbents. The equilibrium data were analyzed using Langmuir and Freundlich isotherm models. Freundlich model was found to fit the equilibrium data very well with high-correlation coefficient (R2). The adsorption kinetics was found to follow pseudo-second-order rate kinetic model, with a good correlation (R2
... Show Moreفي البحث الحالي تم تحضير ودراسة النشاط الحيوي لسلسلة من البوليمرات الجديدة المحورة من الكيتوسان مع مركبات تحتوي على مجموعة الآزو. في البداية تم تحضير ملح الديازونيوم من تفاعل 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine مع حامض الهيدروكلوريك المركز ونتريت الصوديوم .ثم تفاعل الازدواج بين ملح الديازونيوم مع الديهايدات اروماتية معوضة لإنتاج مشتقات الازو (1-6). ازو شف بيس كيتوسان((12-7 والتي حضرت من تفاعل الكيتوسان مع مشتقات
... Show MoreAbstract
The curriculum is the major effective tool in achieving the goals of
education and society.
Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrang
The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show More