Preferred Language
Articles
/
PxaR-IsBVTCNdQwCpedW
A LINGUISTIC INVESTIGATION OF CONTEXTUALIZATION IN RELIGIOUS DISCOURSE
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Criticism and study of “The Arabic translations of contemporary Persian novels” (“Translations of Muhammad Alauddin Mansour” as a model): قنقـــد و بررسی ترجمـــــه¬ی عربی رمــــان¬های معـــــاصر فــــارسی (ترجمه¬های محمد علاء الدین منصور- بررسی نمونه¬ای)
...Show More Authors

     Arab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih‎, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.

      Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 14 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.: THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.
...Show More Authors

This research deals with the relationship between television advertising and buying random cosmetics, where we find that TV ads influence on the purchasing behavior of women, has conducted research in the field on a sample of women in the University of Baghdad, was a random sample taken from 150 different women in the age and social levels educational and cultural students and employees and teachers in order to sample representative be for the research community, and designed a questionnaire for this purpose form as a tool to collect data and information search and analyzed they answered the sample surveyed using a statistical program (spss) to extract percentages And correlation coefficients and testing square Kay , The study found Of w

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Legal Sciences
Compensation for Psychological Damage Caused by Negligence - A Comparative Study
...Show More Authors

Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the

... Show More
View Publication
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref