This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack.
Education around the world has been negatively affected by the new coronavirus disease (COVID-19) pandemic. Many institutions had to transition to distance learning in compliance with the enforced safety measures. Distance learning might work well for settings with stable internet connections, professional technical teams, and basic implementation of technology in education. In contrast, distance learning faces serious challenges in less fortunate settings with inferior infrastructure. This report aims to shed light on the immediate action steps taken at a leading pharmacy school in Iraq to accommodate for the enforced changes in pharmacy education. The University of Baghdad College of Pharmacy went from less than minimal technology impl
... Show MoreA description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
The prospective study has been designed to determine some biomarkers in Iraqi female patients with
breast cancer. The current study contained 30 patients whose tissue samples have been collected from
hospitals in Medical City in Baghdad after consent patients themselves and used immunohistochemical
technique to determine these markers. The results showed a significant correlation between ER and PR tissue
markers (Sig = 0.000) and a significant correlation between cyclin E phenotype and cyclin E intensity (Sig =
0.001).
E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreBackground: In the present study used device jet plasma needle with atmospheric pressure which generates non thermal plasma jet to measure treatment potent with plasma against pathogenic bacteria founded in UTI was inactivated with plasma at 10 sec,
Objective:. This work included the application of the plasma produced from the system in the field of bacterial sterilization , where sample of Gram- negative bacteria (Escherichia coli) were exposed to intervals (1-10)second . Midstream Urine samples swabs were obtained from patients with urinary tract infections.
Type of the study: Cross -sectional study.
Methods: The work were used i
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show MoreIn this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.
In this research , we study the inverse Gompertz distribution (IG) and estimate the survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes
In this work, we use the explicit and the implicit finite-difference methods to solve the nonlocal problem that consists of the diffusion equations together with nonlocal conditions. The nonlocal conditions for these partial differential equations are approximated by using the composite trapezoidal rule, the composite Simpson's 1/3 and 3/8 rules. Also, some numerical examples are presented to show the efficiency of these methods.
This paper deals with the numerical solution of the discrete classical optimal control problem (DCOCP) governing by linear hyperbolic boundary value problem (LHBVP). The method which is used here consists of: the GFEIM " the Galerkin finite element method in space variable with the implicit finite difference method in time variable" to find the solution of the discrete state equation (DSE) and the solution of its corresponding discrete adjoint equation, where a discrete classical control (DCC) is given. The gradient projection method with either the Armijo method (GPARM) or with the optimal method (GPOSM) is used to solve the minimization problem which is obtained from the necessary conditi
... Show More