Preferred Language
Articles
/
eBYg8osBVTCNdQwCzuYL
Flouting of Cooperative Principle in Jane Austen's Pride and Prejudice
...Show More Authors

DBN Rashid, Astra Salvensis, 2018 - Cited by 1

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Survey Based Study: Classification of Patients with Alzheimer’s Disease
...Show More Authors

 Neuroimaging is a description, whether in two-dimensions (2D) or three-dimensions (3D), of the structure and functions of the brain. Neuroimaging provides a valuable diagnostic tool, in which a limited approach is used to create images of the focal sensory system by medicine professionals. For the clinical diagnosis of patients with Alzheimer's Disease (AD) or Mild Cognitive Impairs (MCI), the accurate identification of patients from normal control persons (NCs) is critical. Recently, numerous researches have been undertaken on the identification of AD based on neuroimaging data, including images with radiographs and algorithms for master learning. In the previous decade, these techniques were also used slowly to differentiate AD a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
On Integrability of Christou’s Sixth Order Solitary Wave Equations
...Show More Authors

We examine the integrability in terms of Painlevè analysis for several models of higher order nonlinear solitary wave equations which were recently derived by Christou. Our results point out that these equations do not possess Painlevè property and fail the Painlevè test for some special values of the coefficients; and that indicates a non-integrability criteria of the equations by means of the Painlevè integrability.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 31 2021
Journal Name
Integrative Systematics: Stuttgart Contributions To Natural History
A confirmed record of the European catfish Silurus glanis L., 1758 (Actinopterygii: Siluriformes: Siluridae) from the southern marshes of Iraq, with a new anatomical set of characters to separate S. glanis and S. triostegus
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Principles of Learning Organizations and It`s Role to achieve Group Working: A Viewed Study in Public Company for Webbing Industries in Hilla
...Show More Authors

     Organizations must interact with the environment around them, so the environment must be suitable for that interaction. These companies are now trying to become Learning Organizations because it try to face that challenges may rise from its environments. The Learning Organization is a concept that is becoming an increasingly widespread philosophy in modern companies, from the largest multinationals to the smallest ventures. What is achieved by this philosophy depends considerably on one's interpretation of it and commitment to it. This study gives a definition that we felt was the true ideology behind the Learning Organization and Group Working. A Learning Organization is one in which people at all levels

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Probiotic Application of Bacteriocin-Producing S. Epidermidis in A Cellulosic Pad to Treat Some Skin Infections
...Show More Authors

The aim of this study was to evaluate the possibility of using Staphylococcus epidermidis cells as a probiotic to treat some skin infections. For this purpose, S. epidermidis Y73, which is an active bacteriocin producer and non-biofilm forming isolate, was selected among 134 skin isolates through primary and secondary screening. Tryptic soya broth was selected as the best medium to support bacteriocin production, while the optimal pH and temperature for S. epidermidis Y73 growth were 7 and 37°C, respectively, which were invested in the formula preparation. Furthermore, the possibility of using this isolate as a probiotic was investigated by preparing 4 potential cellulosic pads with 4 different formulae whic

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref