God created man with a social nature, that is, man cannot live alone, but there must be a society associated with him. And when God addressed Adam, the first of His creation, he addressed him with the speech of the Muthanna to him and his wife. “This tree, then you will be among the wrongdoers” (Al-Baqara: 35), and thus was the divine discourse for the first human experience on earth. It accommodates a social relationship, which is (the family), husband and wife. And since a person needs to meet, as Ibn Khaldun said: (The human meeting is necessary, and the wise men express this by saying (the human being is of course civil)) (). And as it is known that with the meeting, relations arise from love and hate, cooperation and struggle, and thus the social reality of the human society arises
In this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str
... Show MoreThis work focused on principle of higher order mode excitation using in- line Double Clad Multi-Mode Mach-Zehnder Interferometer (DC-MM-MZI). The DC-MM-MZI was designed with 50 cm etched MMF. The etching length is 5cm. The tenability of this interferometer was studied using opt grating ver.4.2.2 and optiwave
ver. 7 simulator. After removing (25, 35, 45, 55) μm from MMF and immersing this segment of MMF with water bath contained distilled water and ethanol, in addition to, air. Pulsed laser source centered at 1546.7nm ,pulse width 10ns and peak power 1.33mW was propagated via this interferometer Maximum modes were obtained in case of air surrounded media which are 9800 and 25 um removed cladding layer, with peak power 49.800 m
يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو التعرف
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show MoreIn this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma
... Show More