Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreThe speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p
... Show MoreUltrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreIn recent years, the linguo-philosophical studies of metaphor have tended to define metaphor as an interaction of the object, that is the referent of conceptualization and some features that are associated with sensual manner realities, whose name is used when resolving the conceptual problem-nominative situation, namely the situation of the formation of a new concept and its verbalization. The objective of this term paper lies in the phenomenon of metaphors used in modern political discourse. In our understanding a metaphor is not only of a linguistic nature, but also political. This paper approaches the subject of conceptual metaphor and political argumentation through the prism of synergies of the political topic, affirmative or negative
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreIn this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show More