Preferred Language
Articles
/
jcoeduw-1032
Ibn Tulun's personal and scientific biography Shams Id-Din Mohammad Ibn Ali AL-Dimashqi Al-Salihi (953 A .H / 1546 A.D)
...Show More Authors

The research aims for the study about Ibn Tulun's personal and scientific biography to the
scholar, scientist and historian Ibn Tulun Shams Id- Din Mohammad Ibn Ali al-Dimashqi al-
Salihi (953 A.H. / 1546 A.D.) Ibn Tulun was a prominent Muslim historian in Blad al-
Sham.
At the first deals with Ibn Tulun's personal biography, author's name, Lineage, and
nickname, his nativity; his upbringing, and edification, his moral character, Finally, his death.
As to Ibn Tulun's scientific biography, at the first deals with his initiation into education
and learning , sheds light on his tutors and his authorities , scientific stations and travels , his
scholarly status , and Ibn Tulun's alumni or his students .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Investigation of Lacidipine as a Nanoemulsions
...Show More Authors

Many pharmaceutical molecules have solubility problems that until yet consist a hurdle that restricts their use in the pharmaceutical preparations. Lacidipine (LCDP) is a calcium-channel blocker with low aqueous solubility and bioavailability.

        Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE)  is one of the popular methods that has been used to solve the solubility problems of many drugs. LCDP was formulated as a NE utilizing triacetin as an oil phase, tween 80 and tween 60 as a surfactant and ethanol as a co-surfactant. Nine formulas were prepared, and different tests performed to ensure the stability of the NEs, such as thermodyna

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Similarity and Difference between Sustainable and Green Architecture (a Comparative Study)
...Show More Authors

The research is concerned with studying the characteristics of Sustainable Architecture and Green Architecture, as a general research methodology related to the specific field of architecture, based on the differentiation between two generic concepts, Sustainability and Greening, to form the framework of the research specific methodology, where both concepts seem to be extremely overlapping for research centers, individuals, and relevant organizations. In this regard, the research tend towards searching their characteristics and to clearly differentiates between the two terms, particularly in architecture, where the research seeks understanding sustainable and green architectures, how they are so close or so far, and the

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Role of the Internet in Spreading Rumors Social networking sites "Facebook" model For the duration of 1-7-2017 until 30-11-2017: يوسف محمد حسين
...Show More Authors

This study is about the role of the Internet in spreading rumors, especially through social networking sites "Facebook" model as the effectiveness of social networks lies in the speed of transmission of events; these two characteristics are important to the public, making the Internet a strong contender for television and its relationship with the public. That's why we find that the Internet today has become a fertile environment for the growth and spread of rumors. The more limited the platforms and places of publication, the greater the responsibility in the search for the original source in   spreading this or that rumor, as the Internet is considered an easy means in the production, spreading  and re-spreading  of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A theoretical Design of a cover for lowering the solar cells temperature and enhance their performance
...Show More Authors

In this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs

View Publication Preview PDF
Crossref