Preferred Language
Articles
/
jcois-293
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the Six Sigma technique in a solutionProblems of work (analytical study)
...Show More Authors

The research Concentrates on modern Variable in the organizations that is 6 sigma. The field study is two of Iraqi industrial organizations, The first is state company of …………… , the other is the state company of ……

The problem of the research determines some questions and hypotheses, The data was Collected by question air, which contains 5 dimensions and (10) critical Successful factories  . 

The sample contains (42) who Works in that organizations. The points out many conclusions. The main of it, there is significant differences among the two organizations Then The research concluded with a number of important recommendations serve it's objectives .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Standards Evaluate The Performance of Emergency Departments In Iraqi Hospitals / Case Study
...Show More Authors

     This study aims to evaluate the performance of emergency departments according to international standards through studying the performance in some of Iraqi public hospitals, where the evaluation performance is considered one of the important topics that take a great deal of officials' attention, especially decision makers in health organizations.

      The researcher has derived the research idea from the importance of work in emergency department in hospitals and to what it provides of medical services and quick and immediate nursing care that help in patients' lifesaving, and it is the mirror that reflects the real image for the hospital

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 14 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study The Effect of α-amylase Inhibitors Isolated from Plant Sources on Some Mold.: Study The Effect of α-amylase Inhibitors Isolated from Plant Sources on Some Mold.
...Show More Authors

Activity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Influential Relationship of Environmental Analysis Processes in the Organization's Development Strategy An exploratory study of the views of a sample of the leaders of the Iraqi Ministry of Interior
...Show More Authors

The study aims at diagnosing the importance of environmental analysis (external, industrial and internal) in the organization's strategy for the development of public organizations. The theoretical problem derived from the existence of a knowledge gap for studies and research that dealt with the variables of the study. Three public organizations were selected as the study society (the Civil Defense Directorate, the Directorate of Nationality, Passports and Residency, the General Traffic Directorate). The sample of the study was a sample of (215) managers (managers, department managers, Analysis of the data and hypothesis testing using the appropriate statistical tools, Pearson, the simple and multiple regression coefficient to te

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the "Senge" Model of Organizational Learning in the adoption of Total Quality Management principles) Exploratory study in an organization)
...Show More Authors

      This study is concerned with organizational learning and its impact on total quality management in the education sector. Organizational learning is a process that provides the educational sector with the ability to adapt and respond rapidly to developments and changes in a better way according to its main dimensions (Mental Models, Personal Mastery, Team Learning, Shared Vision, System Thinking) by adopting the philosophy of Total Quality Management (TQM) in accordance with its basic dimensions (leadership, customer satisfaction, participation of workers, continuous improvement, training and education). The main purpose of this study is to know (the impact of the Senge model of organizational learni

... Show More
View Publication Preview PDF
Crossref