Preferred Language
Articles
/
9xcDt4wBVTCNdQwC7gUa
Prediction of Formal Transformations in City Structure (Kufa as a Model) Based on the Cellular Automation Model and Markov Chains
...Show More Authors

The research utilizes data produced by the Local Urban Management Directorate in Najaf and the imagery data from the Landsat 9 satellite, after being processed by the GIS tool. The research follows a descriptive and analytical approach; we integrated the Markov chain analysis and the cellular automation approach to predict transformations in city structure as a result of changes in land utilization. The research also aims to identify approaches to detect post-classification transformations in order to determine changes in land utilization. To predict the future land utilization in the city of Kufa, and to evaluate data accuracy, we used the Kappa Indicator to determine the potential applicability of the probability matrix that resulted from the city's previous formal transformations. This was concluded after comparing the expected results with the data from the actual image. This study demonstrates the usefulness of cellular modelling and Markov's model in determining formal transformations in city structure. This paper contributes to identifying transformations and changes in urban structures because of the importance of this topic in the predictions of the future of cities to control and contain the negative trends of these transformations. The paper simulates spatial and temporal shifts by building a model that integrates mathematical and statistical analysis, and given the results of the Kappa index, the model's simulation capacity was excellent.

Scopus Crossref
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Histological Structure of the Integument in Mastacembelus mastacembelus (Solander)
...Show More Authors

The histological structure of integument in Mastacembelus mastacembelus have been investigated from skin fragments cut from nine regions at body surface. The results revealed that the integument of the fish investigated comprises three principal layers- the epidermis, the dermis (corium) and the subcutis-All the three principal layers may further be divided into secondary layers according to the function performed by their cells. The epidermis may further divided into three layers- the outermost epithelial coverage, the middle layer and the basal layer (stratum germinatiuum)-The dermis consists of a relatively thin upper layer of loose vascular connective tissue called the stratum laxum and a thick lower compact layer- the stratum compactu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Histological structure of the Tongue in Mongoose (Herpestes javanicus)
...Show More Authors

The aim of the present study was to investigate the histological structure of the tongue in Mongoose (Herpestes javanicus) and its related to the feeding pattern. Five adult animals were used in this study . The tongues were dissected and fixed in 10% formalin, then prepared by following stages (dehydration, clearing, and embedding).The serial section(5µ) were stained with(H&E) and some special stains.The histological examination showed that the tongue consists of three tunicae (mucosa, submucosa and musclaris) and the lining epithelium of the filiform papillae is composed of keratinized stratified squamous epithelial tissue. The cylindrical papillae are covered with a highly keratinized stratified squamous epithelial tissue, whereas the k

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Spotlight on the Experience of E-learning as a Learning Method for the Undergraduate Pediatric Nursing Students in Iraq during the COVID-19 Pandemic
...Show More Authors

    The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for The Work of the Certified Fraud Examiner & His Role in Reducing The Incidents of Fraud and Corruption: An Applied Study in The Federal Board of Supreme Audit
...Show More Authors

Is hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
A field study of the problems of queues at some checkpoints in the city of Baghdad
...Show More Authors

 

Abstract

Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.

This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.

Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref