Preferred Language
Articles
/
jcois-293
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Physics
Study the Effect of Dielectric Barrier Discharge (DBD) Plasma on the Decomposition of Volatile Organic Compounds
...Show More Authors

Recently, research has focused on non-thermal plasma (NTP) technologies as a way to remove volatile organic compounds from the air stream, due to its distinctive qualities, which include a quick reaction at room temperature. In this work, the properties of the plasma generated by the dielectric barrier discharge (DBD) system and by a glass insulator were studied. Plasma was generated at different voltages (3, 4, 6, 7, 8 kV ) with a fixed distance between the electrodes of 5 mm, and a constant argon gas flow rate of (2.5) I/min. DBD plasma emission spectra were recorded for each voltage. The Boltzmann plot method was used to calculate the electron temperature in the plasma ( ), and the Stark expansion method was used to calculate the elec

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Study the Effect of Cold Plasma on the Nonlinear Properties of Polymeric Membranes Rod Amine (R3Go)
...Show More Authors

The nonlinear optical properties for polymeric (PMMA) doping with dye Rhodmine (R3Go) has been studied .The samples are prepared by normal polymerization method with concentrations of 5x10-5mol/l and a thickness of 272.5µm.

                         Plasma effect was studied on samples prepared before and after exposure to the Nd: YAG laser for three times 5, 10 and 15 minutes. Z-Scan technique is used to determine the nonlinear optical properties such as; refractive index (n2) and the coefficient of nonlinear absorption (β). It was found that the nonlinear properties is change by increasi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Thermodynamic and Kinetic Study of the Adsorption of Pb (II) from Aqueous Solution Using Bentonite and Activated Carbon
...Show More Authors

The adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The risks of derivatives contracts and their reflections on the global financial crisis Analytical study in (Toronto – Dominion) bank
...Show More Authors

The research tacklets the role of risks arising from the excessive use of derivative contracts for trading in financial crises, including the recent global financial crisis in (2008) which is known the mortgage crisis.

   In order to prove the hypothesis of the research, the risk index of derivative contracts has been chosed as expressed in the measure of (value at risk) to be the main field for testing the hypothesis of research. The duration of the contract  has been also chased  for (15) years between the years (2001- 2015), the period preceding the global financial crisis, while the second represents the period of time that followed. The research reached a number of conclusions, bu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation The Efficiency And Effectiveness of The Iraq stock Exchange -An Empirical Study From July 2004 to March 2008–
...Show More Authors

 The aim of this study was to provide an overall assessment to the efficiency of the Iraq stocks exchanges (ISE) through specifying well –known models .First, Fama's efficient market hypothesis as a contrary concept to the random walk hypothesis, was performed and it has been found that ISE follows the random process, so the price of the shares can't be predicated on the basis of past information. Second,we use a multifactor model, which so named multiple regression, to explore the link between ISE  and the main economic indicators. our empirical analysis finds that every weak associations exists between major ISE measures and main economic indicators.

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
The Use of Digital Public – Relations in the Work of Iraqi Universities: A Survey Study of the Workers in the Departments of Public Relations
...Show More Authors

the digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors