Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MorePregnancy pose an additional burden on the body of the mother so as to meet their needs and the needs of the fetus and the body's need to iron increases excessively during pregnancy and iron is an essential element for the formation of hemoglobin blood Either hemoglobin is the key ingredient for red blood cells which carries oxygen to parts of the body, alas, most of the pregnant women begin their pregnancy inadequate stocks of iron in their bodies, which does not cover their need and requirement of the fetus, especially in the second and third trimesters of pregnancy When you reach the mother to the period in which they did not have the adequate amount of iron to produce hemoglobin become the mother was anemic So emerged the problem of
... Show MoreThrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreComparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital
The research aims to show the impact that the information of the supporting bodies can have and its dimensions represented by (information credibility, efficiency and effectiveness of information, cooperation with the tax administration, obligating the taxpayer, accuracy and completeness of information and the appropriate time) in tax inventory, as well as clarifying the moral differences in The response of the surveyed sample according to the personal variables represented by (gender, educational attainment, scientific specialization, job title, years of service), and the descriptive analytical approach was adopted and in light of it, the questionnaire was designed as a main tool in collecting data from the sample of (80)
... Show MoreWheat straw was modified with malonic acid in order to get low cost adsorbent have a good ability to remove copper and ferric ions from aqueous solutions, chemical modification temperature was 120°C and the time was 12 h. Parameters that affect the adsorption experiments were studied and found the optimum pH were 6 and 5 for copper and iron respectively and the time interval was 120 min and the adsorbent mass was 0.1 g. The values for adsorption isotherms parameters were determined according to Langmuir [qmax were 54.64 and 61.7 mg/g while b values were 0.234 and 0.22 mg/l] , Freundlich [Kf were 16.07 and 18.89 mg/g and n were 2.77 and 3.16], Temkin [B were 0.063 and 0.074 j/mol and At were 0.143 and 1.658 l/g] and for Dubinin-Radushkev
... Show MoreAbstract
Backgrounds: Jaundice occurs in most newborn due to increased bilirubin concentration. Jaundice is observed during the first week after birth in approximately 60% of term neonates. A high level of bilirubin is neurotoxic and may cause neonatal kernicterus, auditory neuropathy or death.
Objectives: to compare the Rh group compatibility, serum bilirubin (total and direct), serum albumin and several liver enzymes between physiological and pathological neonatal jaundice
Materials and Methods: A cross sectional study for one hundred neonates with jaundice divided into group 1: 50 newborns with physiological jaundice, Group 2: 50 newborns with
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The current research aims to reveal the strength of education and the direction of the relationship between the formal thinking and learning methods of Kindergarten department students. To achieve this objective, the researcher developed a scale of formal thinking according to the theory of (Inhelder & Piaget 1958) consisting of (25) items in the form of declarative phrases derived from the analysis of formal thinking skills based on a professional situation that students are expected to interact with in a professional way. The research sample consisted of (100) female students selected randomly who were divided into four groups based on the academic stages, the results revealed that The level of formal thinking of the main sample is
... Show More