The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThis study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-
... Show MoreThis current study aimed to explore the mediation effects of mother's mental health symptoms between marital adjustment and child development aspects. (666) participants of mothers and their children were the sample of the study. The researchers used the marital adjustment scale prepared by Manson, Morse, Lerner, Arthur, as well as, a package of tests for some aspects of growth Kindergarten children prepared by Kenawi and Mohamed (1999). In addition, theyemployed a list of modified symptoms (Symptom Checklist-90- Revised (SCL) -90-, prepared by Derogatis, Lipman and Lipogun & Cov (1976), The results of the current study showed there is a statistically significant relationship between marital adjustment and the symptoms of mental diso
... Show MoreThe standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic
... Show MoreBACKGROUND: Polycystic ovary syndrome(PCOS) is one of the most common endocrine disorder affecting women in reproductive age. No single etiologic factor fully accounts for the spectrum of abnormalities in the polycystic ovary syndrome. Different changes in hormonal, metabolism and the inflammatory markers as squealy of PCOS with adverse effect on the women life. OBJECTIVE: To study the relationship between polycystic ovary syndrome and levels of C-reactive protein, human interleukin and hormonal and metabolic alteration in women with PCOS PATIENTS AND METHODS: Thirty women with Polycystic Ovary syndrome (PCOS) and other thirty women without PCOS were included. Venous blood samples were taken in early follicular phase of menstrual cycle [day
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers and his family and companions.
The study of the jurisprudential opinions of scholars, their choices, or their weightings, sheds light on the approach they followed in their choices, and reveals the originality of the scholar or his influence on those who preceded him from among the scholars.
And the commentators of the noble hadith of the Prophet have their important contributions in this aspect, as they undertake the task of explaining the noble hadith, the second source of legislation
Contemporary commentators have their share in the service of the honorable hadith, and the statement of their choices and preferences, and am
... Show MoreBackground: Smoking is considering a major risk factor for development and progression of periodontal disease. Investigations regarding the association between smoking and periodontal disease have consistently demonstrated negative periodontal effects and greater probabilities of established periodontal disease among smokers in comparison with non smokers. The purpose of this study was to evaluate the effects of smoking on periodontal health status and on the salivary levels of alkaline phosphatase (ALP), lactate dehydrogenase (LDH) and creatine kinase (CK), and to correlate the clinical parameters of periodontal health with the biochemical findings in smokers and non-smokers. Materials and methods: Unstimulated saliva sample was collected
... Show More