Reconstruction an object from its Fourier magnitude has taken a great deal in the literature and there is still no obvious solution for the failure of this algorithm. In this paper, the frequent failure of the phase retrieval is discussed in details and it has been shown that when the object is cento-symmetric, the object support is vital element to ensure uniqueness while for asymmetric object; the asymmetric support of the object is not enough to ensure uniqueness but the reconstruction appear to include most of the information of the original object. This is also true for the reconstruction of a complex function.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreObjectives: To assess the information of mothers regarding asthmatic child care, and to find out the relationship between information of mothers and some of demographic characteristic such as age of mothers, Level of education, and away of child feeding. Methodology: Quantitative design (a descriptive study) was conducted in pediatric hospital in Kirkuk city from the period of first of July 2011 to the end of March 2012. To achieve the objectives of the study, non probability sample of (50) mothers having asthmatic children who attend to the pediatric hospital. The data are collected through utilization
Abstract
Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one
... Show MoreThe research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreThis booklet contains the basic data and graphs forCOVID-19 in Iraq during the first three months of thepandemic ( 24 February to 19 May - 2020 ) , It isperformed to help researchers regarding this health problem (PDF) Information Booklet COVID-19 Graphs For Iraq First 3 Months. Available from: https://www.researchgate.net/publication/341655944_Information_Booklet_COVID-19_Graphs_For_Iraq_First_3_Months#fullTextFileContent [accessed Oct 26 2024].
The purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat
... Show More