Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of an Educational Program in Light Of Behavioral Cognitive Theory to Develop Efficient Response to Students Affected by Crises
...Show More Authors

The aim of this research is to construct an educational program in light of the theory of behavioral cognitive and its impact on the development of the efficient response to students affected by crises (centers of your right to education). To achieve the objectives of the research, two scales were developed by the researcher in addition to two equivalent hypotheses were formulated. The scale contains (26) items divided into five fields; for its validity and reliability were derived based on the measure of efficient response, an educational program based on the theory of behavioral cognition. The test and the educational program were applied to a sample of (60) students from the centers of your right to education, divided into experimenta

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Visual Language as a Reflection of Culture: Violence Against Women in Iraq
...Show More Authors

The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry of the fifth scientific students
...Show More Authors

The research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d

... Show More
View Publication Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
A Comprehensive Study of Smart Grids
...Show More Authors

In this paper, various aspects of smart grids are described. These aspects include the components of smart grids, the detailed functions of the smart energy meters within the smart grids and their effects on increasing the awareness, the advantages and disadvantages of smart grids, and the requirements of utilizing smart grids. To put some light on the difference between smart grids and traditional utility grids, some aspects of the traditional utility grids are covered in this paper as well.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The Relations Of Design And The Role Of It Making The Idea For Fashion Design: فرات جمال العتابي
...Show More Authors

Any design subject to a set of forces contributing to the establishment of relations working to strengthen the internal elements of the design; any imbalance in these elements can make a fragmented and weak design, thus preventing it from achieving the goal or performance. Poor performance can be attributed to various factors: the extent and function of the elements and principles in the design, realization of the idea, especially in fashion design.
Moreover, there are many aspects of a design that go into achieving the realization of the designer’s idea. The design utilizes a lot of stimulants by drawing attention to its design, which is consistent with the need for psychological and material individuals. In this research, we will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Improvement of Mechanical and Rheological Properties of Natural Rubber for Anti-Vibration Applications
...Show More Authors

Abstract  

This research aims to study and improve the passivating specifications of rubber resistant to  vibration. In this paper, seven different rubber recipes were prepared based on mixtures of natural rubber(NR)  as an essential part in addition to the synthetic rubber (IIR, BRcis, SBR, CR)with different rates. Mechanical tests such as tensile strength, hardness, friction, resistance to compression, fatigue and creep testing in addition to the rheological test were performed. Furthermore, scanning electron microscopy (SEM)test was used to examine the structure morphology of rubber. After studying and analyzing the results, we found that, recipe containing (BRcis) of 40% from th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A Study on the Effect of Multistage Toolpath in Fabricating a Customized Cranial Implant in Incremental Sheet Metal Forming
...Show More Authors

Incremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus

... Show More
View Publication Preview PDF
Crossref (1)
Crossref