The absorption spectrum for three types of metal ions in different concentrations has been studying experimentally and theoretically. The examination model is by Gaius model in order to find the best fitting curve and the equation controlled with this behavior. The three metal ions are (Copper chloride Cu+2, Iron chloride Fe+3, and Cobalt chloride Co+2) with different concentrations (10-4, 10-5, 10-6, 10-7) gm/m3. The spectroscopic study included UV-visible and fluorescence spectrum for all different concentrations sample. The results refer to several peaks that appear from the absorption spectrum in the high concentration of all metal ions solution.
... Show More
DBN Rashid, JOURNAL OF XI'AN UNIVERSITY OF ARCHITECTURE & TECHNOLOGY, 2020
The primary objective of this study was to identify the obstacles and problems encountered in the work of sports clubs according to the reality of the application of administrative automation. The present study was conducted in the sports club headquarters of Baghdad within the timeframe of October 2021 to December 2021. In the present study, a descriptive approach was used by the researchers in an analytical style according to the nature of the problem to be studied. The research community of the current study was composed of 100 sports clubs in the governorate of Baghdad. A total of 80 questionnaires were filled by the sample participants, who represented a percentage of 80% of the research community. After processin
... Show MoreThis study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More