Preferred Language
Articles
/
OhfAZY4BVTCNdQwCF0Zm
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strategic importance to European countries that are characterized by the poverty of their resources in traditional energy and depend On the imports of other countries, and accordingly, these countries are trying to search for alternative sources. Germany was one of the first countries that paid attention to the energy transition in terms of its interest in building projects for energy stations with a production capacity of more than 20 megawatts.

Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Rimak International Journal Of Humanities And Social Sciences
THE EFFECT OF ARRANGING WOMEN'S ISSUES IN THE IRAQI ELECTRONIC NEWSPAPERS' WEBSITES ON THE COGNITIVE LEVEL OF IRAQI UNIVERSITY FEMALE TEACHERS A FIELD STUDY OF A SAMPLE OF FEMALE TEACHERS AT THE UNIVERSITY OF BAGHDAD
...Show More Authors

Women are considered the real power to build societies, as they are half of society, and it is their responsibility to raise generations، as human history testifies to the recording of great names with their giving and achievement in various scientific, social and humanitarian disciplines. Because of the importance of women in our lives, society must give them special care, whether at home or within the community structure to which they belong, so that they contribute to the image that brings about a transformation in the public scene, as well as providing them with support to take charge of bringing about change themselves, and this explains the interest of the press at all levels. Women's issues and topics through various journal

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Linguistic Characteristics In The Morphology ( Nominal Suffixes ) Of a Number Of ( Khoryat or Hoyrat ) Printed By The Poet Kamal Mustafa Daquqli: Kemal Mustafa Dakuk ̕ lunun Basılmayan Bazı Hoyratlarında Şekil Bilgisi Özelliklerin ( İsim Durum Ekleri )
...Show More Authors

The present study, entitled “ linguistic characteristics (the morphology - nominal suffixes ) of a number of (Quriyat or koyrat ) by the poet Kamal Mustafa Daquqli, aims at studying and making a comparison between  Turkmen dialect written and spoken forms that show many of the hidden language structures. Similarly, the study sheds light on the poet as one of the most prominent literary figures in Turkmenistan literature.

Turkman Quriyat is one of Turkman blank verse significant forms. Apart from (songs and Quriyat) and until the 19th C., folk poetry has been stalled for a long time but reclaimed its literary high position in the middle of the 20th C.

The study introduction briefly discusses Tu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 29 2021
Journal Name
Journal Of Legal And Political Thought
The extent of the possibility of compensating for the obstruction of the view (vision) as a result of the establishment of public projects - a legal study in light of the position of the American courts
...Show More Authors

Despite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.

View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
University Youth Attitudes towards Electronic Advertisements and their Relationship to the Behavior of the Consumer A Field Study of a Sample of Students of the College of Mass-Communication / University of Baghdad as a Model
...Show More Authors

This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities

... Show More
View Publication
Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree to which Arabic Language Teachers at the Secondary Stage Possess the Teaching Competencies Necessary to Develop the Literary Appreciation Skills of Their Students from the Point of View of Educational Leaders in Bisha Governorate
...Show More Authors

This study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Molecular Cloning of large DNA Fragments of The Sal t Tolerant wild Tetra ploid bermudagrass Cynodon Dactylon L. Using A Bacteriophage Cloning Vector 2. Ligation a nd in vitro packaging of The Recombinant Phage DNA Molecules
...Show More Authors

This  paper represent  the second  step  i n  a molecular clon i ng program ai ming to clone large DNA  fi·agmen ts of the sal t tolerant  bermudagrass (Cyrwdon  dactylon  L.)  DNA  usi ng  the  bacteriophage  (EM13L3) as    a vector.

In th is  work, a yield of about  I 00  g bacteriophage  DNA  per one  liter culture.was obtained  with.a  purity ranging between (1.7-1.8). The vector JJNA  v.as  completely   double   digested   with  the  restriction   enzymes llamHI   and  EcoRI,  followed  by  pu

... Show More
View Publication Preview PDF