Preferred Language
Articles
/
jcois-1007
Distress disorder and the tendency to pray among martyrs' wives
...Show More Authors

The research aimed at identifying  the level of Acute stress disorder  and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical differences according to the variable of age groups, the profession variable, and the academic achievement variable. There is no correlation between the incidence of disturbance of distress and the trend towards supplication in the sample.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS: SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS
...Show More Authors

The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
CONTROL OF INFECTIOUS DISEASES IN FARM ANIMALS IN IRAQ: CONTROL OF INFECTIOUS DISEASES IN FARM ANIMALS IN IRAQ
...Show More Authors

ABSTRACT

              Agricultural production, food security and safety, public health animal welfare, access to markets and alleviation of rural poverty have been achieved by controlling on veterinary services to prevent animal disease. World organization for animal health guidelines focus on controlling of animal disease which depends on good governance and veterinary services quality. The aim of veterinary services is controlling and preventing animal disease some of other aspects; it's responsibility of early detection, rapid response to outbreaks of emerging or re-emerging animal disease, optimizing quality and effectiveness of disease

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Effect of Nickel Substitution On Structural and Electrical Properties of Hg<sub>0.5</sub>Pb<sub>0.5</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3-y</sub>Ni<sub>y</sub>O<sub>8+δ</sub> Superconductor Composite
...Show More Authors
Abstract<p>six specimens of the Hg<sub>0.5</sub>Pb<sub>0.5</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3-y</sub> <italic>Ni<sub>y</sub> </italic>O<sub>8+δ</sub> (y=0.2,0.4,0.6,0.8,1.0) superconducting compound were prepared by solid state reaction method, with sintering temperature equal to 1123K for 24 hours. The electrical resistivity was examined by the four probe technique, It was found that all the specimens have metallic behavior and increasing the critical temperature with increasing nickel concentration. The optimum critical temperature T<sub>c</sub> was found equal </p> ... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 31 2021
Journal Name
لارك
السيد الرئيس والغرانيق
...Show More Authors

  نقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين.  كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا   (1974- 1899)   يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مست

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Psychology And Education
Women's Psychological Migration ... A Conceptual Framework
...Show More Authors

Migration today is a global problem and is an extraordinary social phenomenon that affects countries around the world. Globalization, demographic shifts, political persecution, wars, armed conflicts, natural and environmental disasters, lack of skills, employment and other reasons in many countries have accelerated global migration rates. It has been observed in recent years that there is a rapid feminization of all forms and stages of migration. Women now make up nearly half of the migrant population around the world, and it appears that women have their own motives for migration in addition to family reunification in escaping Gender discrimination, political violence, and social independence, economic motives and the desire for better opp

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref