Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness Of A Proposed Program For Developing The Creative Abilities Of The Students At The University Of Tabuk And Its Effect On The Creative Output Of The Neom Project.
...Show More Authors

The aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.

 To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.

The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Relationship between Emotional Intelligence and Decision Making Styles And their effect on Performance Excellence the university" An exploratory search for a sample of the administrative leaderships in the Mustansiriya University"
...Show More Authors

   Addressed this research the impact of intelligence emotional dimensions of the main(self awareness, and self-management, and social awareness, and relationship management) in the performance excellence the university(performance optimization, and strategic development) this is by middling the styles decision making which are (rational and intuitive, and dependent, and spontaneous, and avoidant), and Go search of an intellectual dilemma raise fundamental questions revolve around the search was to answer those questions through a theoretical framework for search variables first and test models of the relationship and second through the impact six hypotheses President.The objective of the research to make sure the contr

... Show More
View Publication
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Study of the Toxic effect of new Cadmium ( II) complex [ CdL2]. 1/2H2O on GPT and ALP activity in some organs of female mice comparable with anitumor drug Cyclophosphamide (CP)
...Show More Authors

Cadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Analytical Study of the Royal-Jelly Effect on Sperms Morphological Characteristics and some Liver Function Parameters and their Correlation with some Antioxidants in Male Albino Rats Treated with Pregabalin Drug
...Show More Authors
Abstract<p>In recent years, the consideration of natural products as anti-inflammatory and antioxidative treatments has more interested worldwide. Moreover, natural products are easily obtained and are relatively safe the Royal jelly (RJ) is one of them. The current study was carried to evaluate the effects of pregabalin (PGB) on physiological activity of sperms, reproductive hormones assay and some biochemical analysis. Forty (40) male albino rats (10-weeks-old) were divided into four groups (10 rats each): G1 (treated with PGB drug, 150 mg/kg B.wt (Lyrica-Pfizer-Pharmaceutical Industries), G2 (treated with RJ 1g/kg), G3 (treated with PGB drug and RJ together), and G4 control treated with norma</p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 29 2023
Journal Name
International Journal Of Biomaterials
The Influence of the Hyaluronic Acid Gel on the Postoperative Sequelae following Surgical Removal of the Impacted Mandibular Third Molar in Comparison with the A-PRF: A Randomized Controlled Trial
...Show More Authors

One of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Calculated the diffuse and direct parts of global solar radiation in Baghdad city for the period (1983-2005) depending on clearness index by applying the two world models of Liu -Jordan
...Show More Authors

In this paper solar radiation was studied over a region of Baghdad (Latitude 33.3o and longitude 44.4o). The two parts of global solar radiation: diffuse and direct solar radiation were estimated depending on the clearance index of measured data (Average Monthly mean global solar radiation). Metrological data of measured (average monthly mean diffuse and direct solar radiation) were used to comparison the results and show the agreement between them. Results are determined by applying Liu and Jordan two models (1960). Excel 2007program is used in calculation, graphics and comparison the results.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 18 2025
Journal Name
Al–bahith Al–a'alami
The Impact of Means of Communication on Electoral Behavior and its Relationship to the Political Disparity of the Family (A Field Study of an Audience of the University of Baghdad’s Students)
...Show More Authors

Iraq has seen many changes at the social, economic and political levels. This led to cause many shifts in the structure of its society and imposed great challenges reflected in the behavior and awareness of that society in general and youth in particular.

Those changes made the Iraqi society undergoing the transformation of value and culture aspects formed a political awareness that caused cultural and political diversity within the family and society. A greater openness to the outside world caused by the communication revolution, as the world has witnessed during the past two decades, has helped in making that change. Iraq had its share of media and political openness, which were included after the US occupation in 2003. As a re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Effect of Power Sources in the Agricultural Tractor and the Developed Sprayer System on the Performance of the Electrical and Mechanical Sprayer System and some Performance Indicators of the Engine
...Show More Authors
Abstract<p>An experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref