The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreAcademia Open Vol 8 No 2 (2023): December DOI: 10.21070/acopen.8.2023.8087 . Article type: (Medicine)Impact of COVID-19 on Dental Students' Psychological Health Maryam Hameed Alwan, [email protected], (1) Department of Oral Diagnosis, College of Dentistry, Baghdad University, Iraq, Iraq (1) Corresponding author Abstract This study investigates the psychological impact of the COVID-19 pandemic on dental students at Baghdad University College of Dentistry. Conducted between December 2021 and January 2022, this cross-sectional survey aligns with ethical guidelines and the Helsinki Declaration. The study utilized Cochran's equation to determine a sample size of at least 400, ensuring a 95% confidence level with a 5% margin of e
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
The research’s main goal is to investigate the effects of using magnetic water in concrete mixes with regard to various mechanical properties such as compressive, flexural, and splitting tensile strength. The concrete mix investigated was designed to attain a specified cylinder compressive strength (30 MPa), with mix proportions of 1:1.8:2.68 cement to sand to crushed aggregate. The cement content was about 380 kg/m3, with a w/c ratio equal to 0.54, sand content of about 685 kg/m3, and gravel content of about 1,020 kg/m3. Magnetic water was prepared via passing ordinary water throughout a magnetic field with a magnetic intensity of 9,000 Gauss. The strength test
A Multiple System Biometric System Based on ECG Data