Preferred Language
Articles
/
-RboGYcBVTCNdQwCOTa1
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath: Fatin Kaleel Ismael
...Show More Authors

A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Implied Meaning in Selected Poems by T.S. Eliot and Al-Sayyab
...Show More Authors

In addition to its basic communicative function, language can be used to imply information that is not actually stated, i.e. addressers do not always state exactly (or directly) what they mean. Such instances fall within the domain of pragmatics in that they have to do with how addressers use language to communicate in a particular situation by implication rather than by direct statement. The researcher attempts to demonstrate that the beauty and the multiple layers of meaning in poetry can be better explored if the addressee looks at the lines from a pragmatic perspective in search for implied meaning. There are many devices that can convey implied meaning in poetry, among which are 'rhetorical', 'figurative' or 'literary' devices. But

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of the self-questioning strategy in the achievement of the third stage Institutes of teacher preparation and decision - making in Chemistry
...Show More Authors

This research aims to find out "the effectiveness of the self-questioning strategy in the achievement of students Phase III institutes of teacher preparation and decision-making in chemistry." The researcher follows approach quasi-experimental with a post-test, and the sample consisted of (27) from " Teachers Training Institute-AL-Byaa "in Directorate of Education Baghdad Karkh / 2 students divided into two unequal groups: experimental its number (14) students studied using reciprocal teaching strategy and control its number (13) students have studied in the usual way.The two groups were equivalent extraneous variables.

The researcher was prepare achievement test consist of 40 items was the adoption of a measure of decision-makin

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Simultaneous influences of hematocrit in the erythrocyte medium on erythrocyte aggregation and sedimentation: a kinetic study by a laser scattering technique
...Show More Authors

The erythrocyte aggregation is an important physiological phenomenon in the circulation of blood. It is a basic characteristic of normal blood that plays a major role in the cardiovascular system, especially in the microcirculation. This study explained the kinetics of single cells rouleaux formation one- dimensional aggregate and three- dimensional aggregate, during simultaneous, and the effect of hematocrit on the process of aggregation and sedimentation. The present study was done on forty one healthy subjects. Laser light is passed through a well mixed sample of blood and the forward scattered light intensities recorded continuously. The samples were prepared with different hematocrit, (10%, 15%, 20%, and 25%). Increasing

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 22 2019
Journal Name
International Journal Of Advancement In Social Science And Humanity
A CRITICAL DISCOURSE ANALYSIS STUDY OF PERSUASION IN THE LANGUAGE USED IN THE ELECTION CAMPAIGNS BY AMERICAN PARLIAMENTS
...Show More Authors

BN Rashid

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Civil Engineering And Technology
NUMERICAL ANALYSIS OF PILES FOUNDATION TO REDUCE THE ZONE OF LIQUEFACTION OF SANDY SOIL UNDER DYNAMIC LOADS
...Show More Authors

The major cause of destruction during vertical vibration is the failure of the soil structure. The soil may fail due to loss of strength during continues vibration. The saturated sandy soil losses strength due to an increase in pore pressure, this phenomenon is called "liquefaction". Piled foundations are usually adopted as a foundation solution in potentially liquefiable soil under dynamic loading. In this research, 3D finite element model using PLAXIS Software was employed for pile foundation in saturated sandy soil. The results show the acceleration mobilization and velocity on the footing increases with increasing the intensity of dynamic loads and it becomes zero at maximum value of vertical settlement which indicates the end of the ti

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Coincidence and Common Fixed Point Theorems for Two Self Mappings under Generalized Contractive Condition in Cone-b- Metric Space
...Show More Authors

    In this paper, we prove some coincidence and common fixed point theorems for a pair of discontinuous weakly compatible self mappings satisfying generalized contractive condition in the setting of Cone-b- metric space under assumption that the Cone which is used is nonnormal. Our results are generalizations of some recent results.

View Publication Preview PDF
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of Self-Assessment on Income and Sale Tax Collection' From the Point View of Income Tax Auditors in Jordan
...Show More Authors

This study aimed to show the extent of compliance with the income taxpayer  to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in  Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of self-assessment system, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of viewof Jordanian income tax auditors ,results shows there's a strong  relation between these variables and Income Tax collections.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe

... Show More
View Publication Preview PDF
Crossref