Preferred Language
Articles
/
YxbQ54sBVTCNdQwCO-SY
‘Resymbolization’ of a Text; a Relatively Different Perspective of Graham Greene’s The Quiet American
...Show More Authors

The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intended through unveiling that historical fact. Meanwhile it displays the varied Americans responses to the text and how particular responses twisted the genuine intention of the author. The researcher also scrutinizes the text to expose Washington decision makers’ policy in dealing with third world countries. Their devious inclination of achieving freedom and bringing democracy for those suffering nations which eventually turns to nothing except death and destruction.

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Lambert Academic Publishing
Expressions of Gratitude in American English and Iraqi Arabic, Al-Zubaidi Nassier |... | bol
...Show More Authors

Expressions of Gratitude in American English and Iraqi Arabic (). Expressing gratitude is one of the most frequently occurring communicative acts in...

View Publication
Publication Date
Tue Jul 31 2018
Journal Name
Amazon
Linguistic Landscapes across Cultures: Semiotics of Shop Signs in Iraqi and American Contexts
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A comparison among Different Methods for Estimating Regression Parameters with Autocorrelation Problem under Exponentially Distributed Error
...Show More Authors

Multiple linear regressions are concerned with studying and analyzing the relationship between the dependent variable and a set of explanatory variables. From this relationship the values of variables are predicted. In this paper the multiple linear regression model and three covariates were studied in the presence of the problem of auto-correlation of errors when the random error distributed the distribution of exponential. Three methods were compared (general least squares, M robust, and Laplace robust method). We have employed the simulation studies and calculated the statistical standard mean squares error with sample sizes (15, 30, 60, 100). Further we applied the best method on the real experiment data representing the varieties of

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Computers And Electronics In Agriculture
A novel heat-pulse probe for measuring soil thermal conductivity: Field test under different tillage practices
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
A reflection of organizational citizenship behaviors in the performance of employees A prospective study of a sample of the teaching staff working in the Degla University College
...Show More Authors

 

Abstract
        This research aims to identify the relationship and the impact of the behavior of organizational citizenship in the performance of employees, as practiced behaviors organizational citizenship substantial role in achieving the objectives of both the organization and its staff at the same time, so it affects a large extent on the characteristics and performance of individuals employees and thus influence the success of the organization as a whole, problem of the research has indicated that there is a clear failure in the study of the impact of the behavior of organizational citizenship in the performance of employees, was chosen

... Show More
View Publication Preview PDF
Crossref