Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.
the Current research aims to identify the psychological stressors coping strategies and their relationship to the cognitive motivation among Al-Anbar University students through the following hypotheses: 1) no statistically significant differences at a level (0.05) among the sample according to the instrumental support strategy depending on the variable type and specialization, 2) No statistically significant differences at a level (0.05) among the sample in regard of coping avoiding strategy depending on the variable type and specialization, 3) There is no statistically significant difference at a level (0.05) in cognitive motivation level among Al-Anbar University students, 4) No statistically significant differences at a level (0.05)
... Show More|
This study aims to identify the most important legislatures and legal frameworks pertaining to advertisement for children. It focuses on the western approach, which is characterized by the variety of its perspectives in presenting issues and in identifying problems. However, if studies show that there is a certain awareness about the advertisement impact on children, it is obvious that most of legislatures reject the laws restricting the broadcast advertising spots intended for children under 12 years of age, with the exception of the Swedish and the Canadian province of Quebec experiences, which opted for total ban on advertising spots broadcast messages targeting children. |
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
The higher education has become an enterprise integrate system that described as knowledge society, the essential part in its electronic and virtual format in the shadow of globalization challenges with its various dimensions . Until the logical ryles aboat a strategic partnership between the Iraqi higher education establishments and their international equivalent ones Strategic windows should be invested for the purpose of enhancing the quality of higher education in a sustainable way. This forms a challenge before the international education leaders on the social, operational and establishment's level to determinte knowledge gap, observing, diagnosing and processing in the present and future, e
... Show MoreBackground: COVID-19 has caused a considerable number of hospital admissions in China since December 2019. Many COVID-19 patients experience signs of acute respiratory distress syndrome, and some are even in danger of dying. Objective: to measure the serum levels of D-dimer, Neutrophil-Lymphocyte count ratio (NLR), and neopterin in patients hospitalized with severe COVID-19 in Baghdad, Iraq. And to determine the cut-off values (critical values) of these markers for the distinction between the severe patients diagnosed with COVID‐19 and the controls. Materials and methods: In this case-control study, we collect blood from 89 subjects, 45 were severe patients hospitalized in many Baghdad medical centers who were diagnosed with COVID
... Show MoreA large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show MoreThis paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
This study titled “digital addiction and its relationship to social isolation among children in the autism spectrum from the point of view of their parents” in which the
researcher addressed an important topic which is knowledge of digital addiction in a
child with autism spectrum and its relationship to social isolation in them.
The study aimed to dhed the light on the digital addiction in a spectrum child Autism
from the point of view of their parents، by knowing the extent of addiction of children
in the autism spectrum، and identifying the relationship between electronic addiction and the social isolation of children in the autism spectrum.The study presented
several hypotheses،
Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment
And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-
Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in
... Show More