Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreObjective: To identify the effectiveness of instruction oriented intervention for primipara women upon episiotomy and self
perineal care.
Methodology: A quasi-experimental study was carried out to determine the effectiveness of instruction-oriented
intervention for primipara women upon episiotomy and self-perineal care. A purposive "non-probability" sample of (60)
primipara mothers was selected from Ibn AL-Balady Pediatric and Maternity Hospital, Al-russafa, Baghdad. The sample
has been divided into two groups; (30) primipara women who were considered as a study group, and another (30) primipara
women who were considered as a control one. The study group was exposed to an instruction-oriented intervention. While,
the
Objective: To determine the effectiveness of an Intervention Oriented program on the prognosis of Osteopenia among Women at Private clinics in Baghdad City. Methodology: A longitudinal design. A purposive ''non probability'' sample of (25) Women who have bone mineral density (BMD) T- test between (-1 to -2.5). The data are collected through the utilization of a constructed questionnaire and by means of interview with each client who is involved in the study. Each interview takes approximately (20) minutes. Results: The study showed that there is a good improvement in bone density accord after applicatio
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese
... Show MoreThe definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.