Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the struggle of evil in this world and the Hereafter, where he said, may God’s prayers and peace be upon him : (Whoever travels a path seeking knowledge, Allah will make a path easy for him to Paradise, and the angels lower their wings in approval (narrators of the omnipotent). And we are in the midst of this relentless campaign against the ideas of our late nation, behind which it is intended to obliterate the correct intellectual truth and replace it with atheistic ideas or ideas that lead us to diminish the greatness of Islam, its creed and its law, we find it necessary for us to enlighten and understand well our Islamic heritage and what our previous scholars left of the civilizational and sober intellectual legacy Especially in the field of fighting philosophers, atheists, and those with narrow ideas, through the extensive and detailed study of those important manuscripts that are found in the shelves of international libraries. Ibn Abd al-Rashid al-Khawji, may God have mercy on him, a wide mercy, as he explained in it the book Ma’alim Usul al-Din by Imam Fakhr al-Islam Muhammad ibn Umar al-Razi, upon him be the clouds of mercy and pleasure. And it is called the speaking souls. May God make us among those who speak the truth in this world and the Hereafter. He is the best protector, and the best supporter to him is our fear in the few and the many, and may God's prayers and peace be upon the pearl of the coincidence of existence and the owner of the praised place, our master and our lord Muhammad and his good family and his faithful companions.
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreAbstract Introduction: MMP3 plays a crucial role in the process of bone erosion in the pathomechanism of rheumatoid arthritis (RA). It acts by removing the outer osteoid layer, which allows the osteoclasts to tightly connect and carry out the subsequent damage to the underlying bone. MMP3 can trigger the production of other MMPs like MMP-1, MMP-7, and MMP-9, it plays a pivotal role in the remodeling of connective tissues. Aim of the study: to assess the influence of MMP-3 serum levels and single-nucleotide polymorphisms of rs679620 in the rheumatoid arthritis patients' group in comparison to the control group. Subjects: eighty eight samples, 45 rheumatoid arthritis patients after being referred by their treating physician for regular RA
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreIn this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreBackground: Most adolescent girls experience some degree of dysmenorrhea, which can impact on their daily activities. It is responsible for school absenteeism or interruption of social activities. Therefore, investigating dysmenorrhea among secondary school students is important to provide caregivers with data necessary for interventions
Objectives: This study was conducted to estimate the prevalence of dysmenorrhea among secondary school students in Basra, Iraq and to study its impact on their daily activities.
Materials & methods: A cross sectional study was conducted from Jan. 2011 to May 2011 among 350 secondary school students using a semi-structured questionnair
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreIn this paper, the structure of and have been introduced and studied. We also obtain that a is of a if and only if there exists an on such that . In addition, we obtain that of if and only if there is an on such that , where are subspaces of with eigenvalues 1 and −1, respectively. We also find t that the existence of on implies that there exists a compatible under appropriate condition.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More