Preferred Language
Articles
/
ijs-1904
A Jordan Higher Reverse Left (resp. right) Centralizer on Prime -Rings
...Show More Authors

In this paper,  we introduce the concepts of  higher reverse left (resp.right)   centralizer, Jordan higher reverse left (resp. right) centralizer, and Jordan triple higher reverse left (resp. right) centralizer of  G-rings. We prove that every Jordan higher reverse left (resp. right) centralizer of a 2-torsion free prime G-ring M is a higher reverse left (resp. right) centralizer of  M.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis A Number of Amino Substitutions on Hexachlorocyclotriphosphazene
...Show More Authors

(DPA)) 5Cl3N3(NAM)) and compound (2) (P5Cl3N3The preparation of compound (1) ((P ) of the reaction hexachlorocyclotriphosphazene (A) and 2(Bc)4Cl3N3and compound (3) ((P Nicotinamide (B), di phenylamine (C) and Benzocaine (D) at different rates and by the frared inIR -presence of triethylamine. The synthe sized compounds were characterized by FT P NMR spectrum. 31H,1 and spectrum

View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Research Journal Of Pharmacy And Technology
A Review on Film Forming Drug Delivery Systems
...Show More Authors

Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
A Review on Arabic Sign Language Translator Systems
...Show More Authors
Abstract<p>Deaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b</p> ... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Nov 02 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study on Liqid- Liquid Etraction on Iron(III) With 2,5- Diphenyi Oxazole
...Show More Authors

A study on  liquid- liquid extraction  of Iron (III) in Benzene has  been made. The effect of different parameters such as type of medium and time of equilibration,  concentration  of metal  ion, type of organic  solvent,  and effect of cations on distribution ratio of Iron (III). Has been studies the stoichiometry   of  the  extracted  species  determined   using  slope  analysis method and found to be (M:L) (1 :3).

View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Illocutionary Act in a Selected Presidential Speech on COVID-19
...Show More Authors

     This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak.  A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.

     What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
On A Modified SP-Iterative Scheme for Approximating Fixed Point of A Contraction Mapping
...Show More Authors

In this paper, we will show that the Modified SP iteration can be used to approximate fixed point of contraction mappings under certain condition. Also, we show that this iteration method is faster than Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Furthermore, by using the same condition, we shown that the Picard S- iteration method converges faster than Modified SP iteration and hence also faster than all Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Finally, a data dependence result is proven for fixed point of contraction mappings with the help of the Modified SP iteration process.

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref