Preferred Language
Articles
/
jcoeduw-966
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 22 2023
Journal Name
Nasaq Journal
The language of diplomats in modern Russian (stylistic and educational aspect(
...Show More Authors

This article is devoted to the stylistic and educational characteristics of the language of Russian diplomacy. The article describes the stylistic and educational aspect of the appearance of the Russian protocol, its relation to universal diplomacy, the relationship between the diplomatic language and the business sub-style. Here the semantic features of the diplomatic vocabulary are determined and the factors influencing its formation and the emergence of new terms in the language of Russian diplomacy are considered. The article also examines the national and cultural identity of the language of Russian diplomacy, provides rules for drafting diplomatic documents and conducting negotiations, defines the concept of a document as a whole, giv

... Show More
Publication Date
Fri Nov 02 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Bio-social Aspect with Cholelithiasis Patients in Baghdad City
...Show More Authors

Objective: To find out the relationship between the bio-social aspect with cholelithiasis patients and
demographic characteristics in Baghdad city.
Methodology: A purposive (non-probability) sample of (100) patients, from (20-70) years old, who were
selected from patients who were admitted to hospital at preoperative stage, from Gastroenterology and
Hepatology Hospital, Baghdad Teaching Hospital, Al-Yarmook Teaching Hospital, Al-Karama Teaching
Hospital, Teaching Hospital. A descriptive study was carried out from 25th of June 2004 to the end of October
2004.
An assessment form was constructed for the purpose of the study. Test-retest reliability was employed through
computation of Pearson correlation coefficient.

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of governmental consumer spending on the development of the current account balance in Iraq for the period (1990-2014) using ARDL model
...Show More Authors

To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more  imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
LA TRANSGRESSION CHEZ RIMBAUD Lecture de I' aspect de Transgression dans Marine
...Show More Authors

LA TRANSGRESSION CHEZ RIMBAUD Lecture de I' aspect de Transgression dans Marine

View Publication Preview PDF
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Education-oriented Program on Parents' Awareness towards Adolescents' Violence Control in Baghdad City
...Show More Authors

Objective: This study aims to determine the effectiveness of health education oriented program on parents' awareness
towards adolescents' violence control.
Methodology: A quasi-experimental study was carried out in Baghdad city form 1st of April, 2008 to 1st of September,
2009. A purposive "non-probability" sample of 60 parents who have adolescents' violence in their families who were
selected according to specific criteria. The researcher divided the samples into two equal groups; the study and control
groups. The health education program, as well as a questionnaire was constructed as tools for data collection by the
researcher for the purpose of the study. Content validity was determined by a panel of experts in diffe

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 06 2021
Journal Name
Pierm
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t

... Show More
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF