Preferred Language
Articles
/
gIYInoYBIXToZYALbJoQ
Integrated approach for non-Darcy flow in hydraulic fractures considering different fracture geometries and reservoir characteristics
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Characteristics of costume design in children's theater performances
...Show More Authors

Theatrical costume constitutes a peculiarity in the theatrical performance because of its ability to communicate and communicate with the rest of the visual elements of the show in highlighting the intellectual and dramatic values. Fashion developments in theatrical performance, the second: the design elements of costumes and their characteristics, the third, which includes research procedures, and the fourth, in which the research results and conclusions were presented, including:

  • The play (Happening on the Farm) is considered one of the plays with educational, educational and aesthetic goals, as it carried in its formats the features of simplicity and diversity of the visual formal connotations of the child.
  • The c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Characteristics of linguistic discourse in The Holy Quran
...Show More Authors

It is no secret to anyone that the Koran is a speech to people, and how it is not a speech to humans is a home to them and suitable for their understandings, and the people of rhetoric mean great care has never been before in the division of the Koranic discourse, followed by linguists and science of the Koran. After reading the letter, I followed it in the Holy Quran, taking advantage of what was written by former writers in language and interpretation. Thanks to God, I have done what I wanted. Perhaps one of the most important reasons that led me to write my research and optional for this topic; is related to the Koran. So I started to develop the research plan, and divided it as I saw it, I started to pave the way, and then divided it

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 10 2026
Journal Name
Nasaq
Characteristics of Zoomorphic Metaphor in Russian Political Discourse
...Show More Authors

View Publication
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
The use of Resource Consumption Accounting and Balanced Scorecard Methods as an Integrated Framework in Correcting the Economic Unit Performance: Applied Study
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (22)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Control And Optimization
Impact of wind flow and global warming in the dynamics of prey–predator model
...Show More Authors

View Publication
Scopus (28)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2016
Journal Name
Iraqi National Journal Of Chemistry
Physical and Electrical Study of Different Carbone Nanomaterials as Modifying Material for SPCE
...Show More Authors

In this work was prepared three different types of modified screen printed carbon electrode (SPCEs) with drops casted method, the used carbone nanomaterials were the MWCNT, functionalized –MWCNT (f-MWCNT) and After several experiments were made to find an appropriate ratio to make good GOT/f-MWCNT nanocomposite, and found the suspension mixture (1:1) from GOT/f-MWCNT (f-MWCNT-GOT). The electrical and physical properties were performed with cyclic voltammeter technique, and studied the maximum current response, the effective surface area, effect of the pH value and the determination of active surface area for MWCNT-SPCE , f-MWCNT-SPCE and f-MWCNT-GOT/SPCE as (0.04 cm2), (0.119 cm2) and (0.115 cm2) respectively, the surface coverage concent

... Show More
Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Yazyk I Kul'tura
Cognitive-communicative approach in the system of teaching Russian language for foreign students (in the condition of no language environment)
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref