Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The discovery of novel therapeutic molecules is always difficult, and there are a variety of methodologies that use the most diverse and innovative medicinal chemistry approaches. One such approach is the deuteration technique: Deuteration is the process of substituting deuterium for hydrogen in a molecule. When compared to the drug molecule, its deuterated analogues may retain the features of the original molecule and, in some cases, improve its pharmacological activity, with fewer side effects and lower toxicity. Metronidazole is a commonly used antibiotic to treat anaerobic bacterial infections, protozoal and microaerophilic bacterial infections. Met
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreBackground: Directly observed therapy-short course (DOTS) had been adopted by World Health Organization (WHO) as hopeful strategy for treatment of tuberculosis (TB) since early nineties. Iraqi health authorities started DOTS implementation since 2001 in Baghdad. Coverage expanded gradually till 100% in 2004. War and unstable security condition hit Iraq since March 2003. Objective: The objective of this study was To evaluate the DOTS implementation program in Baghdad in different periods including 2 unstable periods for proper assessment of war and instability on treatment of TB. Patients and methods: This study had been conducted in Baghdad during four different periods (before and during 2003 war, after war; without and with DOTS). Dire
... Show MoreIn this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.
Abstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreMany biological tests were done to study the effect of the crude alcoholic leaves extracts on the biological characteristics at the larvae fruit fly Ceratitis capitata with different concentrations of the extracts exposed 1,2,3,5 and 7.5 % at constant laboratory conditions includes the temperature and the relative humidity (27±2C0&70±5 % respectively). The results of the experiments showed that the alcoholic extracts of the plant effected the growth and the development of the larvae and pupae according to the concentrations . The alcoholic extracts proved to have the highest mortality tend to 66.76 % in larva treated with alcoholic at concentration 7.5 % the
... Show MoreBack ground: Glass ionomer materials lack resistance to wear and pressure and are susceptible to moisture during the initial stages of setting and dehydration. So this study was done to assess diametral tensile strength and microhardness of glass ionomer reinforced by different amounts of hydroxyapatite. Materials and methods: In this study a hydroxyapatite material was added to glass monomer cement at different ratios: 10%, 15%, 20%, 25% and 30% (by weight). The diametral tensile strength test described by the British standard specification for zinc polycarboxylate cement was used in this study and the microhardness test was performed using Vickers microhardness testing machine and the microhardness values were calculated and statistical c
... Show More