The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achieving the synchronization.
ABSTRACT: BACKGROUND: Infantile haemangioma one of the most common tumour of new borns , a safe and effective treatment options are under ongoing research . OBJECTIVE: The authors show the effectiveness and safety of low dose propranolol as a method for infantile haemangioma treatment . METHOD: In this study twenty- four patients with infantile haemangioma in different anatomical locations were treated with oral propranolol and the result were assessed in a retrospective analysis of the results patients were kept on 0.25 mg/kg/day for one month , then on 0.5mg/kg/day in 2 divided doses for another one month , in the third month the dose will be increased to 1 mg/kg/day in 2 divided doses , then the propranolol were given in a maintenance do
... Show MoreBackground: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.
Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.
Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreAbstract
Objective(s): to Evaluation of Parents’ Knowledge about Nutritional Management of kids with Phenylketonuria; to Identify the association between parents’ Knowledge about nutritional management then their demographic variables of fathers, mothers (parents age, residence then socioeconomic position).
Methodology: A non-experimental project; was accompanied on parents of phenylketonuria kid in Baghdad town since the period 3 June to 5 October 2022. A Non-probability sample (convenience) of 35 PKU children and their parents (father and mother) was selected Purposively from the hospitals that are select for the study. A survey is built for the purpose of the educa
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreThis study aimed to know the attitudes and practice of pharmacists regarding the management of minor ailments in Iraqi community pharmacies. A cross-sectional study for 320 community pharmacists was conducted during February 2020 using a newly developed and validated questionnaire. Only 4.4% of pharmacists prefer not to deal with minor ailment cases. Minority (15.6%) of participated pharmacists refer more than half of minor ailment cases they face to the physician. Regarding the assessment of minor ailments using WWHAM technique, what are the symptoms are the most commonly asked questions by pharmacists. Only 49.1% mentioned that they ask all WWHAM questions. On the other hand, most pharmacists (90%) educate their patients about the dosi
... Show More