Preferred Language
Articles
/
GhYUyogBVTCNdQwCGoLS
ROLE OF METAPHOR IN PUPPET IMPLEMENTATION (ON THE EXAMPLE OF D. RUBINA'S NOVEL «PETRUSHKA'S SYNDROME»)
...Show More Authors

The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.

Publication Date
Thu Jul 01 2010
Journal Name
International Journal Of Advancements In Computing Technology
Implementation of digital chaotic signal generator based on reconfigurable LFSRs for multiple access communications
...Show More Authors

This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec

... Show More
Scopus (3)
Scopus
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The role of some types of erythrocytes on the growth of Entamoeba histolytica trophozoite in vitro
...Show More Authors

The parasite E.histolytica was first isolated from a stool sample, and then cultivated and maintained in vitro using Locke-egg medium (LEM) and Liver infusion agar medium (LIAM) . Then, the effect of some types of erythrocytes (human and sheep), on the growth and activity of the parasite in the two culture media was investigated. The parasite was able to ingest and lysis erythrocytes of human and sheep that were supplemented to the culture media and such manipulation was able to augment the reproduction rate of the cultivated E. histolytica, however, such consequence was media- and concentration-dependent. The reproduction rate was significantly increased (66.0, 57.5 and 58.6%, respectively) in LEM medium containing human erythrocytes ty

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Evaluating Asphalt Concrete Properties by the Implementation of Ultrasonic Pulse Velocity
...Show More Authors

 

In past years, structural pavement solution has been combined with destructive testing; these destructive methods are being replaced by non-destructive testing methods (NDT). Because the destructive test causes damage due to coring conducted for testing and also the difficulty of adequately repairing the core position in the field. Ultrasonic pulse velocity was used to evaluate the strength and volumetric properties of asphalt concrete, of binder course. The impact of moisture damage and testing temperature on pulse velocity has also been studied. Data were analyzed and modeled. It was found that using non-destructive testing represented by pulse velocity could be useful to predict the quality of asphalt c

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Effect of Metformin Therapy on Reducing Leptin Resistance and Enhancing Ovulation in Women with Polycystic Ovary Syndrome
...Show More Authors

Background: The relation between insulin resistance ,leptin levels and other hormones in women with polycystic ovary syndrome(PCOS) is still controversial.Metformin therapy is proved effective in reducing insulin resistance and also in some studies it was seen to be effective in reducing leptin levels.
Al- Kindy Col Med J 2012 ; Vol .8 No. (2) p: 65
Objective: to study the effect of metformin on reducing leptin levels and enhancing ovulation in PCOS women.
Methods:metformin 500mg 3 times daily for 3 months was was given to 36 women
with proved PCOS, in addition to that, other parameters were included.
Results:28 women out of 36(77.78%) showed an evidence of ovulation ovulation after 3 months of metformin therapy(p<0.01)

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Down syndrome construction
...Show More Authors

Due to the increasing number of people with in Iraq, it has become necessary to treat seriously this problem, which was not considered significantly to the best of researcher knowledge. Thus, the current research aims to construct a scale to measure the physical down syndromes, which distinguish them from others. It consisted of (39) items. The researcher has presented some related literature that addressed the current problem

View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of Iraqi Virtual Library
...Show More Authors

      In developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e

... Show More
View Publication Preview PDF