Preferred Language
Articles
/
EBe-do4BVTCNdQwC_0k6
A New Text from Ur III dynasty on Ba’aga, the fattener

يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته من السنة السابعة من حكم الملك أمار-سين والى السنة الثالثة من حكم الملك أبي-سين.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Aug 02 2016
Journal Name
European Academic Research
‘Resymbolization’ of a Text; a Relatively Different Perspective of Graham Greene’s The Quiet American

The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend

... Show More
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MORCHELLA CONICA PERS., 1818 (PEZIZALES, MORCHELLACEAE): A NEW RECORD FROM IRAQ

The present study reports Morchella conica Pers.1818, which belongs to the family, Morchellaceae as a new record of Iraqi macromycota based on the morphological and molecular methods. During their short and often sporadic fruiting season, this fungal species was found in mixed forest unburned areas in Branan ranges (Suliamaniya Province, Northeast Iraq). Currently, M. conica is the second Morchella species reported from Iraq. The current study aimed to introduce this new record, which is poorly studied in the Middle East. M. conica is morphologically described and phylogenetically confirmed. The relationship between this species and other species within the genus was studied using the nrDNA ITS sequences from different species and divers

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF LIODONTOMERUS GAH. FROM IRAQ (HYMENOPTERA, TORYMIDAE)

A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.

View Publication Preview PDF
Publication Date
Mon Sep 25 2023
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Characterization, Biological Activity and Thermal Study of New Complexes [Ni II, Hg II and La III] from Mixed Ligands (Curcumin and Azo compounds type N2O2)

The compound [L] was produced in the current study through the reaction of 4-aminoacetophenon with 4-methoxyaniline in the cold, concentrated HCl with 10% NaNO2. Curcumin, several transition metal complexes (Ni (II), La (III), and Hg (II)), and compound [L] were combined in EtOH to create new complexes. UV-vis spectroscopy, FTIR, AA, TGA-DSC, conductivity, chloride content, and elemental analysis (CHNS) were used to describe the structure of produced complexes. Biological activities against fungi, S. aureus (G+), Pseudomonas (G-), E. coli (G-), and Proteus (G-) were demonstrated using complexes. Depending on the outcomes of the aforementioned methods, octahedral formulas were given as the geometrical structures for each created comp

... Show More
Scopus Crossref
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Crossref
View Publication
Publication Date
Mon Dec 26 2022
Journal Name
Journal Of The College Of Basic Education
The directorial vision of the theatrical text In the concept of a picture theater

أثر تنوع الرؤى الاخراجية للاتجاهات والحركات المسرحية المعاصرة في أتساعالاشتراطات الجمالية لبنية الخطاب المسرحي + الامر الذي ادى الى انزياح مكوناتالعرض وعناصره ؛ ومنها المنظومة السردية للنص التي شكلت في بدايات المسرحجغرافية العرض المسرحي والمرتكز النظري والفكري الذي يمد العرض المسرحي أغلبتدفقه الجمالي وعنصر أستعلائي لعناصر العرض الاخرى ؛ وضمن التطورات اللاحقةأنسحب المخرج المسرحي من سطوة البنية النص

... Show More
View Publication
Publication Date
Tue Dec 01 2009
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF THE GENUS POLLENIA ROB.-DESVOIDY, 1830 (DIPTERA : CALLIPHORIDAE) FROM IRAQ

This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.

View Publication Preview PDF