Preferred Language
Articles
/
cBcle48BVTCNdQwCunnJ
The prevalence of lymph proliferative disorders in a group of Iraqi patients and its relation to blood indices parameters
...Show More Authors

Abstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619

Scopus
View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
The future role of the military establishment in the political life of Egypt
...Show More Authors

There are certain dates in the history of nations that have their effects on them ,and the 25th of January 2011 is considered one of them in the history of the state of Egypt .Since this date Egypt has passed through many events that led to changes in the political life and its actors . New rolls has arisen for actors that didn't take part in the political life before so clearly ,like the military establishment which started to practice more prominent political roll, till it became the most important actor in the political life of Egypt .This establishment tried to institutionalize its roll through constitutional means ,considering that controlling the authority is the only alternative to safeguard the state which we are trying to study

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The Allegorical Use of the Rituals of Hunting in Galway Kinnell's "The Bear"
...Show More Authors

Galway Kinnell (1927-) is considered as one of the most important contemporary American poets who brought about a drastic change in the American poetry of the nineteen sixties. Kinnell's poetry is characterized by being simple in style and deep in content. Poetry for him is a means through which he perceives the inner levels of consciousness in an attempt to comprehend the depths of the American self. Therefore, he writes narrative poems in which the emphasis is not on the rhetorical effects, but on the inner transformations through which the poet goes.

"The Bear" (1968) is typical of Kinnell's introspective poetry. It takes the form of a journey in which the rituals of hunting are used allegorically to embody the state of the sp

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
The Role of Communication Methods in Changing the Values of the Urban Family
...Show More Authors

This article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Revue Académique De La Recherche Juridique
Humanizing the provisions of the law: (the case of winter truce in France)
...Show More Authors

Since the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.

View Publication