Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Nanoscience
Study of the Interaction Between Reduced Graphene Oxide and NO<sub>2</sub>Gas Molecules via Density Functional Theory (DFT)
...Show More Authors

Electronic properties such as density of state, energy gap, HOMO (the highest occupied molecular orbital) level, LUMO (the lowest unoccupied molecular orbital) level and density of bonds, as well as spectroscopic properties like infrared (IR), Raman scattering, force constant, and reduced masses for coronene C24, reduced graphene oxide (rGO) C24O5and interaction between C24O5and NO2gas molecules were investigated. Density functional theory (DFT) with the exchange hybrid function B3LYP with 6-311G** basis sets through the Gaussian 09 W software program was used to do these calculations. Gaussian view 05 was em

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Applications of social networking sites: Research Tools
...Show More Authors

Media and communication's research are varied in accordance to research approaches' variety which seeks to reach convergent social, psychological, political, economic, and technical point of views. Its main aim is to assimilate all the new variables in the communicative method, especially, social media sites research; concerning their methodology, tools and theories. It is due to their diverse - developed applications and their increased rates of public use becoming irreplaceable in our daily life. It is well reflected by their consequent impact on the the public beside their role in changing its views.

This clarifies the notable increase of scientific research that concern them manifesting the dialectica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Applications of GIS for Bridges Maintenance Service
...Show More Authors
Abstract<p>AThe Bridge Maintenance Management System (BMMS) is an application system that uses existing data from a Bridge Management System database for monitoring and analysis of current bridges performance, as well as for estimating the current and future maintenance and rehabilitation needs of the bridges. In a transportation context, the maintenance management is described as a cost-effective process to operate, construct, and maintain physical money. This needs analytical tools to support the allocation of resources, materials, equipment, including personnel, and supplies. Therefore, Geographic Information System (GIS) can be considered as one tool to develop the road and bridge maintenanc</p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Journal Of Energy Storage
Nanofluid-assisted enhanced sealing security for efficient geological hydrogen storage in Saudi Arabian basalt
...Show More Authors

The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif

... Show More
View Publication
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Thu Oct 18 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
Breaching the Cooperative Principle Theory in English and Russian One Act Plays
...Show More Authors

PDBNRSIA Asst, International Journal of Research in Social Sciences and Humanities, 2018

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
New Trends in Teaching and Learning Theory Dr. Jasim Muhammad Abdul- Slamy
...Show More Authors

New trends in teaching and learning theory are considered a theoretical axis
from which came the background that depends on any source, or practice sample or
teaching plane, accuracy and simplicity prevent the development of the teaching
process. Many attempts have come to scene to illuminate the teaching background,
but they have not exceed those remarkable patterns and methods. Thus, the
appearance of the teaching theory have been hindered.
This led to the need for research and development in the field of teaching to
find out a specific teaching theory according to the modern trends and concepts.
Teaching is regarded a humanitarian process which aims at helping those who
want to acquire knowledge, since teach

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Diabetes &amp; Metabolic Syndrome: Clinical Research &amp; Reviews
Nephrotic range proteinuria; does it predict lung involvement in patients with type 2 diabetes
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Obstacles to employing social media applications in measuring public opinion
...Show More Authors

Media and communication's research are varied in accordance to research approaches' variety which seeks to reach convergent social, psycholo

... Show More
View Publication Preview PDF
Crossref