The research aims to build an educational program - learning, according to the concepts of renewable energy and nanotechnology And knowledge of its impact on the technological enlightenment when the third phase students in the Department of Chemistry, and to verify the goal and put the researcher null hypothesis the following: No Statistically significant difference at the level (0.05) between the average scores of the experimental group students who are studying material nanotechnology and renewable energy program Altalima- learning and the average score for the control group of students who are studying the same article the usual way in technological enlightenment. The search was limited to the third row in the Department of Chemistry,
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreProteus mirabilis is considered as a third common cause of catheter-associated urinary tract infection, with urease production, the potency of catheter blockage due to the formation of biofilm formation is significantly enhanced. Biofilms are major virulence factors expressed by pathogenic bacteria to resist antibiotics; in this concern the need for providing new alternatives for antibiotics is getting urgent need, This study aimed to explore whether green synthesized zinc oxide nanoparticles (ZnO NPs) can function as an anti-biofilm agent produced by P.mirabilis. Bacterial cells were capable of catalyzing the biosynthesis process by producing reductive enzymes. The nanoparticles were synthesized from cell free
... Show Moreى ىلإ يقيبطتلا وبناج يف ثحبلا ىعس دقو ،ةصاخلا ةيراجتلا ؼراصملا يف ؽيقدتلا فاجل ؿيكشت ( تمض ةنابتسا ةرامتسا ـيمصت متخم تاعاطق ىمع ؿماكلاب ايعاجرتسا ـتو فايبتسا ةرامتسا ) 36 ةف فم فإ :ايمىا فاك تاجاتنتسلاا فم ةعومجمل ثحبلا ؿصوت دقو ،ؽيقدتلا فاجل ؿمعب ةمص تاذو تامومعملاب ةقثلا زيزعتو ةيلاملا ريراقتلا ةدوج فامض يف اىرود وى ؽيقدتلا فاجمل ةميملا ـايملا ا يف يرادلإاو يلاملا ءادلأا طبض ةيممع ىمع سكعني هرودب يذلاو
... Show MoreThe research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and
The vision and philosophy of the economic system in Iraq after 2003 were not clear-cut because of overlapping internal factors was the novelty of the political system and the lack of political and economic decision makers to understanding and conviction full need shaping a new administration for the Iraqi economy is able to succeed economic development programs, and external factors was determinedly organizations international application of shock reforming style and contrary to the social reality and the security which reflected negatively on the work and consistency Lisseeash financial balance between stability and growth and raise the level of consumer spending and the importance of r
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThis study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these
... Show More