Preferred Language
Articles
/
ijs-675
Secret-Word by e-Abacus Diagram I

This experiment may be applied before with certain and special roles, but never applied under partition theory (Abacus James Diagram) conditions. Therefore, we would have to find an appropriate design for each character to enable us sending a word represented as increasing number with meaning only for beneficiaries.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Scopus Crossref
View Publication
Publication Date
Thu Aug 02 2018
Journal Name
European Journal Of Oral Sciences
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 29 2022
Journal Name
Chemphyschem
Spherical Aromaticity of Tetrahedral Pnictogens Through <i>Off</i> ‐Nucleus Isotropic Magnetic Shielding

This work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+

... Show More
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Four Women: The E. Cassirer’s Theory and Its Analytical Potential for Understanding Iraqi Symbolic Painting by J. Saleem

Based on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
On semi strongly (E, F)-convex functions and semi strongly (E, F)-convex optimization problems
Abstract<p>In this paper, a new class of non-convex functions called semi strongly (<italic>E, F</italic>)-convex functions are presented. This class represents a natural extension of semi strongly <italic>E</italic>-convex functions shown in the literature. Different properties of this class of functions are discussed. Optimality properties of constrained optimization problems in which the objective function or the inequality constraints functions are semi strongly (<italic>E, F</italic>)-convex are proved for this class.</p>
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Fri Oct 01 2021
Journal Name
Chemistryopen
Bonding, Aromaticity and Isomerization of Furfuraldehyde through <i>Off</i> ‐Nucleus Isotropic Magnetic Shielding

Off-nucleus isotropic magnetic shielding (σiso(r)) and multi-points nucleus independent chemical shift (NICS(0-2 Å)) index were utilized to find the impacts of the isomerization of gas-phase furfuraldehyde (FD) on bonding and aromaticity of FD. Multidimensional (1D to 3D) grids of ghost atoms (bqs) were used as local magnetic probes to evaluate σiso(r) through gauge-including atomic orbitals (GIAO) at density functional theory (DFT) and B3LYP functional/6-311+G(d,p) basis set level of theory. 1D σiso(r) responses along each bond of FD were examined. Also, a σiso(r) 2D-scan was performed to obtain σiso(r) behavior at vertical heights of 0–1 Å above the FD plane in its cis, transition state (TS) and trans forms. New techniques fo

... Show More
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
ORGANIZATION OF MEMORY CHIPS IN MEMORY SYSTEMS THAT HAVE WORD SIZE WIDER THAN 8-BIT

This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically.

Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What agreed word and differed from        Fundamentalist terms        Between my school of speakers and jurists

In his study, the researcher highlighted the most important methods of authorship in the fundamentals of jurisprudence and speech. Fundamentalist rules and extraction and access method; they also distinct from each other that each has special divisions of the subjects of jurisprudence.

View Publication Preview PDF