Ibn al-Anbari, however, turned to Abu Hatim al-Sijistani in eleven places of his book ((clarify the endowment and start)). The study showed that the right and right was with the son of Anbari and that what went to Sistani saying uniqueness, and contrary to the vast majority of scientists. The study also showed that the science of grammar affects the endowment and initiation, as the study showed that the science of endowment and initiation is one of the important sciences of the Koran, which must be carefully received, researchers.
Objectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (hormonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland (hormonal and histological changes) related with
time. The study last for six months for the period of 1/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology department, College of Medicine, University of Baghdad.
Results: The study shows changes in hormonal levels of thyroid hormones (T3 & T4) and also histologic
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreRelation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
Vol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More