Preferred Language
Articles
/
DxemeJIBVTCNdQwCibF0
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crystallization of (cultural statements) that control the behaviour of characters, develop the narrative event and monitor personality transformations in rural society. The pattern of (class disparity) is dominates the joints of social life in the Iraqi countryside, as (AL-Saied) *4 enjoy those whose belongs by descent or race to the prophet Mohammed (Salaa Allah Ealayh Wasalam) * with enjoy special privileges not available to a (commoners) which reinforces the idea of class disparity in the Iraqi countryside. Within a male society in which the man imposed his control with strict provisions, the material and civil rights of women were lost and turned into a means and a tool to be to be exchanged according to the map of male interests, between a minor girl who is forced to marry under the saying (Kisma)* and another confiscates her freedom to choose her life partner and she is forced to marry her cousin under the saying (Al-Nahwa)* , and another is forcing her to stop her social life and cancel her feelings if her husband dies under the saying (loyalty to the husband after his death) and other sayings that tightened the noose on women in all their forms.

Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Sensors
A Multimodality Hybrid Gamma-Optical Camera for Intraoperative Imaging
...Show More Authors

The development of low profile gamma-ray detectors has encouraged the production of small field of view (SFOV) hand-held imaging devices for use at the patient bedside and in operating theatres. Early development of these SFOV cameras was focussed on a single modality—gamma ray imaging. Recently, a hybrid system—gamma plus optical imaging—has been developed. This combination of optical and gamma cameras enables high spatial resolution multi-modal imaging, giving a superimposed scintigraphic and optical image. Hybrid imaging offers new possibilities for assisting clinicians and surgeons in localising the site of uptake in procedures such as sentinel node detection. The hybrid camera concept can be extended to a multimodal detec

... Show More
View Publication
Scopus (24)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

View Publication
Crossref (4)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Interval Value Fuzzy k-Ideals of a KU-Semigroup
...Show More Authors

The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.

Publication Date
Mon Dec 25 2017
Journal Name
Oriental Journal Of Physical Sciences
Evaluating a Chemical/Biological Laboratory to Promote Safety Measures
...Show More Authors

The Department of Chemical and Biological Engineering, Al-Khwarizmi College of Engineering at Baghdad University has lately renovated its own research laboratories to comply with international safety measures and conduct undergraduate and postgraduate research. In this regard, the department has harnessed some amenities within the college to establish these laboratories taking into accounts creating a convenient, safe, and developed working environment for both researchers and students. A precise procedure was followed to establish this laboratory which includes providing new bench tops which offer spacious working places for workers. These benches were supplied with power points, gas, water, and compressed air outlets. In addition,

... Show More
View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Toward a stereotype specification for measurement of university women
...Show More Authors

A- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Pharmaceutical Negative Results
Characterization Synthesis Of Copper Oxide. Nanoparticles Application. A Review.
...Show More Authors

Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref