Preferred Language
Articles
/
jcois-622
Narrative narration in the poetry of Mohammed Abdul Muttalib   (Top poem as a model)
...Show More Authors

Poets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, uninterrupted Communication is free from modern elements such as anticipation, retrieval and surprise, and all this is mixed with metaphorical poetic language and poetic rhythm (internal and external) and all in a distinctive literary context, according to which is a temptation to the recipient and this may have been modern poets great importance, because of her (poetic story) We have chosen the Arab poet (Mohamed Abdel-Muttalib), who is one of the pioneers of the end of the nineteenth century and the beginning of the twentieth century, and this poet was distinguished by its sober style, and the pronunciation of the word , And his broad imagination , All those elements have enabled the poet of his poem which he outlined the wonderful narrative style biography forward systems (Ali Bin Abi Talib, peace be upon him), a poetic story was interesting because of the many influential events. Through this, I sought to analyze the events described by the poet in a literary manner committed to impartiality and objectivity, and this approach showed us the versatility of this poet in this area (poetic story).
In conclusion, the poet shred and creativity in the weaving of events that have gone through a wonderful narrative style and interesting to the other, including the method of modern techniques ..

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Alexandria Engineering Journal
A new tilted aerial robotic platform: Modeling and control
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Acta Facultatis Medicae Naissensis
A correlation between body mass index and refractive errors
...Show More Authors

Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Mon Mar 03 2025
Journal Name
Internationaljournalof Economicsandfinancestudies
CROSS-SECTIONAL REGRESSION WITH PROXIES: A SEMI-PARAMETRIC METHOD
...Show More Authors

This study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K

... Show More
View Publication
Scopus
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
The Warning Messages of Jeanne DuPrau’sThe City of Ember to the World with Reference to Gil Kenan’s Film Adaptation: The Theory of Conspiracy
...Show More Authors

The City of Ember is a very interesting novel that is although intended for young readers, have so many layers and messages that are misunderstood. In this research, both the novel and the film adaptation are studied with the intent to decode the warning messages that the novelist and the director tried to introduce to the audience. The research studies four vital messages; the first message is that history repeats itself for the novel has many allusions to the history of Jews and their painful holocaust and even goes back in history the days of Moses and the Exodus, the second message tackles the conspiracy theory that states nothing happens by accident and that everything is planned and connected hence comes the third message

... Show More
View Publication Preview PDF