Preferred Language
Articles
/
jcois-293
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 21 2021
Journal Name
Journal Of Legal Sciences
The scope of parliamentary immunity in the UAE Constitutional organization: Comparative Study
...Show More Authors

The immunity enjoyed by members of parliament is one of the most important guarantees for the performance of their parliamentary work, which protects them from threats or any reprisals against them.

There are two types of immunity:

  Objective immunity: the member does not bear any responsibility for the opinions, ideas, and statements he expresses within the council or its committees, but even outside it by some systems.

  Procedural immunity: that prevents criminal actions from being taken during or outside the session of the Council, with the approval of a body specified by the constitutions of the countries under study, but it is restricted by conditions and controls stipulated. It contains constitut

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 21 2017
Journal Name
Lecture Notes In Computer Science
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Fraud under the fair value Exploratory Study
...Show More Authors

The research aim is to identify the concept of fair value and its measurement approaches, shed light on the concept of fraud and its forms, motives, as well as how to identify fraud under the fair value method.

I have been using the program package SSPS statistical in the calculation of the research variables, and the research sample was a group of university professors and auditors working in the federal board of Supreme Audit. 

 The researcher has reached some conclusions, the most important; the lack of conclusive evidence about management's intent in adopting the use of fair value raises several doubts about the credibility of the statements prepared in under the fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Meanings Mentioned in the Quran - objective study
...Show More Authors

Praise be to God, who has seen uniting the wonders of manufactures, and pronounced Pthamidh oddity Alambdoat, and swam his creation in different languages, Glory is not equal to one in the earth and the heavens, praise Him, and I bear witness that there is no god but Allah alone with no partner certificate towering branches, and I bear witness that Muhammad is His slave and Messenger sent swage Arab government balance, and clearest statement, and the highest residence and Ohllagha words, and Oovaha Zmama, he pointed the way and advised the creation, and the month of Islam, breaking idols, and showed provisions, uncle Balanaam, God separated blessings and peace upon our Prophet Muhammad and the God of the good and virtuous and his compani

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Building a strategic perspective on the system of governance and measuring the level of its performance Survey study at the University of Basra
...Show More Authors

The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself.  From the main conclusions:-It is possible to building a strategic perspective

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
original study Judicial rules of law And its applications in the Hanbali school of thought
...Show More Authors

Praise be to God alone, and after:

This is a research entitled: “A fundamental study of judicial jurisprudence rules and their applications in the Hanbali school of thought,” in which the researcher studied eight legal jurisprudential rules considered by the Hanbalis and others.

At the conclusion of his research, the researcher reached a number of results, including: the importance of taking care of judicial rules, and the need for judges and their assistants to them, including: the need for students of science in Hanbali jurisprudence to study these rules according to the doctrine, and to highlight their applications to them, including: the importance of the rules under study, and their impact on rulings Jurisprudenc

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
The Impact of Agile Methodologies and Cost Management Success Factors: An Empirical Study
...Show More Authors

Software cost management is a significant feature of project management. As such, it needs to be employed in a project or line of work. Software cost management is integral to software development failures, which, in turn, cause software failure. Thus, it is imperative that software development professionals develop their cost management skills to deliver successful software projects. The aim of this study is to examine the impact of cost management success factors with project management factors and three agile methodologies – Extreme Programming (XP), Scrum and Kanban methodologies which are used in the Pakistani software industry. To determine the results, the researchers applied quantitative approach through an extensive survey on

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref