As smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreIn this article, we investigate the peristaltic flow of a Powell-Eyring fluid flowing in an asymmetrical channel with an inclining magnetic field through a porous medium, and we focus on the impact that varying rotation has on this flow. Long wavelength and low Reynolds number are assumed, where the perturbation approach is used to solve the nonlinear governing equations in the Cartesian coordinate system to produce series solutions. Distributions of velocity and pressure gradients are expressed mathematically. The effect of these parameters is discussed and illustrated graphically through the set of figures. To get these numerical results, we used the math program MATHEMATICA.
This paper intends to initiate a new type of generalized closed set in topological space with the theoretical application of generalized topological space. This newly defined set is a weaker form than the -closed set as well as -closed set. Some phenomenal characterizations and results of newly defined sets are inculcated in a proper manner. The characteristics of normal spaces and regular spaces are achieved in the light of the generalized pre-regular closed set.
Understanding sedimentation behavior and its transport capacity in the Tigris River is of significant importance owing to the detrimental consequences caused by it. This study investigates the sediment amounts transported along the reach of the Tigris River in Baghdad. The CCHE2D model which is a common tool developed by the National Center for Computational Hydrological Science and Engineering (NCCHE) was applied to investigate the flow pattern and sediment amounts within 7 km reach. The model was initially calibrated and validated under steady-state conditions at the Sarai gauging station (upstream) and its performance was evaluated around the Abu Nawas water treatment plant (downstream). The result shows that the water surfac
... Show MoreWith simple and undirected connected graph Φ, the Schultz and modified Schultz polynomials are defined as and , respectively, where the summation is taken over all unordered pairs of distinct vertices in V(Φ), where V(Φ) is the vertex set of Φ, degu is the degree of vertex u and d(v,u) is the ordinary distance between v and u, u≠v. In this study, the Shultz distance, modified Schultz distance, the polynomial, index, and average for both have been generalized, and this generalization has been applied to some special graphs.
In 1979, the Directorate General of Antiquities of Iraq in Baghdad ordered the resumption of archaeological excavation in Assur within plan square hC/D/E8I, where Walter Andrae had discovered the so-called “House of the Incantation Priest” in the summer of 1908. More than 150 clay tablets and fragments were unearthed within several rooms, among these tablet IM 148516 which contains a new anti-witchcraft ritual conducted before the moon-god.
In this work, combining acyclovir with ciprofloxacin (CCP), a new Schiff base and its metal complexes with iron (III), manganese (II), copper (II), zinc (II), and calcium (II) ions are synthesized and structurally characterized by XRD, SEM, 1H NMR, 13C NMR, FT-IR, and UV-Visible spectral techniques. Furthermore, molecular docking studies were carried out, and the complexes were tested to resolve any potential hang-ups in opposition to the Herpes virus and DFT calculation studies. In addition, the metal complexes and ligand were screened against antibacterial strains of one gram-positive bacteria (Staphylococcus aureus) and three gram-negative bacteria (
... Show MoreThis paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:
The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.
Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreDeep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme
... Show MoreWe define and study new ideas of fibrewise topological space namely fibrewise multi-topological space . We also submit the relevance of fibrewise closed and open topological space . Also fibrewise multi-locally sliceable and fibrewise multi-locally section able multi-topological space . Furthermore, we propose and prove a number of statements about these ideas. On the other hand, extend separation axioms of ordinary topology into fibrewise setting. The separation axioms are said to be fibrewise multi-T0. spaces, fibrewise multi-T1spaces, fibrewise multi-R0 spaces, fibrewise multi-Hausdorff spaces, fibrewise multi-functionally Hausdorff spaces, fibrewise multi-regular spaces, fibrewise multi-completely regular spaces, fibrewise multi-normal
... Show MoreThe purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.
Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreIodine-131 has become an essential radionuclide used in nuclear medicine for clinical and research purposes. The increase use of this radionuclide in medicine for diagnostic and treatment of thyroid diseases creates a demand to obtain a feasible methodology for occupational or accidental monitoring of internal contamination. In this study, two techniques were employed to find an appropriate one of in vivo bioassay for evaluating Iodine-131 body content. A scanning Whole Body Counter (WBC) equipped with 6NaI (Tl) scintillation detector, an anthropomorphic phantom and point source were used. The results showed that the counter sensitivity, as a first approach (conventional method), had a logarithmic and significant correlation w
... Show Moreهدف البحث الى التعرف على تأثير تمرينات خاصة في تطوير بعض القدرات البدنية وانجاز مسابقة عدو(100) متر حواجز تحت (20) سنة. استخدمت الباحثتان المنهج التجريبي بتصميم المجموعة التجريبية ذات الاختبار القبلي والبعدي لملائمته طبيعة البحث. تم تحديد مجتمع البحث بالطريقة العمدية وهم عداءات 100م حواجز من فئة الشباب، واختيار عداءات نادي السليمانية بألعاب القوى وتم اختيار العينة بصورة قصدية بأسلوب الاختبارين القبلي والبعدي و
... Show Moreإنَّ من أجلِّ العلومِ علوم العربيَّة , إذْ هيَ المَرقاة إلى فهمِ كتابِ الله , وقد بذلَ سلفُنا الصالح في هذا المجال جهودًا مضنية , وقفوا من خلالِها على أسرارِ الكثيرِ من لطائفِ هذه اللغةِ الشريفة, وتركوا لنا تراثًا ضخمًا أودعوه دقائقَ فكرهِم وعميقَ نظرهِم وهو عنوان لحضارة ِهذه الأمة وأمجادها .
أمَّا ابنُ خروف فهو من أشهر نحاة الأندلس في القرن السادس والسابع الهجريين , ومن أشهرِ شُرَّاح كتاب سيبويه ,
... Show MoreThe basic goal of this research is to utilize an analytical method which is called the Modified Iterative Method in order to gain an approximate analytic solution to the Sine-Gordon equation. The suggested method is the amalgamation of the iterative method and a well-known technique, namely the Adomian decomposition method. A method minimizes the computational size, averts round-off errors, transformation and linearization, or takes some restrictive assumptions. Several examples are chosen to show the importance and effectiveness of the proposed method. In addition, a modified iterative method gives faster and easier solutions than other methods. These solutions are accurate and in agreement with the series
... Show MoreIn this paper, we introduce the notation of the soft bornological group to solve the problem of boundedness for the soft group. We combine soft set theory with bornology space to produce a new structure which is called soft bornological group. So that both the product and inverse maps are soft bounded. As well as, we study the actions of the soft bornological group on the soft bornological sets. The aim soft bornological set is to partition into orbital classes by acting soft bornological group on the soft bornological set. In addition, we explain the centralizer, normalizer, and stabilizer in details. The main important results are to prove that the product of soft bornological groups is soft bornol
... Show MoreThe definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
Biocompatible gold nanoparticles were successfully synthesized by hibiscus plant leaf extract as a bioreactor. The prepared nanoparticles were evaluated using UV/Vis spectroscopy, Atomic Force Microscopy (AFM), Fourier Transform Infrared Spectroscopy (FT-IR), X-ray Diffraction and Scanning Electron Microscopy (SEM) . The study also investigated the effect of the different gamma irradiation doses on the size and dispersion of the produced nanoparticles. In UV- Vis spectra, the peak of Au NPs' surface plasmon resonance (SPR) was detected as a single peak at 543 nm. The gamma irradiation induced a blue shift in the SPR peak, which indicates that it might be applied as affective factor for size control. Physical as well as chemi
... Show MoreIt is estimated that about 20% of all hospital-acquired infections can be attributed to environmental contamination. Acinetobacter baumannii has been identified as the primary pathogen, posing a significant hazard to human health. This work aims to evaluate the frequency, and pattern of antibiotic resistance, as well as the correlation between biofilm production and the distribution of biofilm-related genotypes in multidrug-resistant A. baumannii samples isolated from a tertiary hospital environment in Baghdad, Iraq. Conventional methods, biochemical analysis, the VITEK-2 compact system, and blaoxa-51 gene amplification were employed to identify suspected isolates. The biofilm-forming capability and antibiotic
... Show MoreMolecular epidemiology techniques played a crucial role during the COVID-19 pandemic, as the genotyping of emerging variants was essential for effective surveillance, predicting transmission rates, and understanding the evolutionary dynamics of the virus. In Iraq, the epidemiological status before and after the 4th wave of Omicron emerging variant is unknown as it was preceded by a mass gathering event of Arbaeen pilgrimage. In this study, TaqPath RT-PCR assay was exploited along with epidemiological approaches to monitor and track dominant mutation and to identify hot spot region in Iraq through analyzing 3,748 SARS-CoV-2 positive specimens collected from different Iraqi governorates from September 5th, 2021, to March 28th, 2022. Curren
... Show MoreQuantitative analysis of morphometric drainage systems is crucial for understanding hydrological and environmental interactions of watersheds. This study uses geospatial techniques to analyze the morphometric characteristics of watersheds, relying on ALOS World 3D DEM and topographic maps of Iraq. Key features identified include main basins, sub-basins, slopes, drainage networks, topographical patterns, flow sequences, and flow lengths. ArcGIS Pro V.3.0.2 was used to determine these characteristics. The analysis includes hydrological processes like runoff frequency, bifurcation ratio, circularity ratio, and surface runoff length. The study aims to understand how these parameters affect the regional morphological landscape and the role of
... Show MoreThis research examined the presence of the rs10759931 single nucleotide polymorphism (SNP) in the TLR4 gene among COVID-19 patients. Additionally, it evaluated how this genetic variation influenced cognitive difficulties in individuals recovering from the disease. This Case–control study (60 patients, 30 recovered, and 50 controls) investigates the G/A genotype of rs10759931 in all studied groups, using a conventional polymerase chain reaction with an allele-specific primer method. Results showed a median of ages was significant raising in age accompanied by severe cases (p =0.003) and more than 50% of the moderate infections in the youth category. Regarding the recovered individual’s occurrence six cases along with ages med
... Show MoreLeech saliva contains numerous compounds, primarily consisting of proteins and peptides. This research focused on two leech species, Hirudo verbana and Hirudo orientalis, which were obtained from various alternative medicine clinics and scientific centers located in Baghdad, Iraq. Saliva samples were collected from the leehches after 5 and 6 weeks of food deprivation. Bradford proteins assay, UV absorption technique, Gel electrophoresis and RP-HPLC were used to analyze their saliva chemically. Anticoagulant activity of their saliva was also assessed using prothrombin time assay. Results showed that the concentration of saliva proteins were higher in the 5 weeks of starvation than the concentration of proteins in the 6 w
... Show MoreThroughout this paper we depend on the concept of μ- small submodule to generalized the Jacobson radical called μ-Radical that lead us to present a generalization of (GP*) property.
White skin has long been considered the standard of beauty; however, women who use skin-whitening creams may be unaware that these products contain toxic metals, posing significant health risks to consumers. Therefore, this research aimed to detect the concentration of some toxic metals in thirty whitening creams by flame atomic absorption spectroscopy and to evaluate the carcinogenic and non-carcinogenic risks for all tested samples. The results showed that the average concentrations for all samples were in the order Cd < Co < Cr < Ni < Hg < Pb. All samples exhibited elevated concentrations of Hg, reaching levels up to ten times higher than the permissible limits set by the World Health Organization (WHO) and three times
... Show MoreIn this work, we obtain some differential subordination and superordination results defined by Hadamard product for multivalent analytic functions with Borel distribution and Ruscheweyh derivative in the open unit disk. We applied these results and obtain sandwich results.
Breast cancer is a complex and multifaceted disease, comprising diverse subtypes that can be characterized by distinct histopathological, molecular, and clinical features. The dysregulation of β-catenin, a key transcription factor in the Wnt/β-catenin signaling pathway, plays a critical role in the early stages of tumorigenesis, ultimately influencing clinical outcomes. This study aimed to determine the correlation between sera and urine β-catenin levels in Iraqi patients with breast cancer comparing with control and first relative groups and to assess whether urine can be utilized as a substitute to sera to measure this status. The levels of β-catenin in fasting sera and urine were measured
... Show More