Preferred Language
Articles
/
jeasiq-1121
Economic globalization adapts to a new stage of development
...Show More Authors

the pursue of social  systems history present to us solid evidence that the collapse of  that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate  auto adaptation mechanism and use it excellently in the right time.

The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the globalization can eventually to ply efficiently the command roll to achieve the adaptation within the capitalism system through many mechanisms such as the matereal, qualitative, technical, intellectual, and institutional appliances that applied by the system for adaptation achievements.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antimicrobial Screening of New Schiff Bases Linked to Phthalimidyl Phenyl Sulfonate Moiety
...Show More Authors

A series of Schiff bases linked to phthalimidyl phenyl sulfonate moiety have been synthesized via multistep synthesis. The first step involved reaction of phthalic anhydride with aniline producing N-phenyl phthalamic acid which was subsequently dehydrated to the corresponding N-phenyl phthalimide via treatment with acetic anhydride and anhydrous sodium acetate. The synthesized imide was treated with chlorosulfonic acid in the third step producing 4-(N-phthalimidyl) phenyl sulfonyl chloride which was introduced in reaction with 4-hydroxy acetophenone in the fourth step producing 4-[4-(N-phthalimidyl) phenyl sulfonate] acetophenone and this in turn was introduced successfully in condensation reaction with various aromatic primary amines affor

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Description of A New Species of Leafhopper Genus Assuita Lindberg; 1969 (Hemoptera: Cicadellidae: Agalliinae) From Iraq
...Show More Authors

The present study introduces description of a new species of leafhopper of genus Assuita Lindberg; 1969. This study includes external morphological characters and the spotting patterns and photos of vertex face pronotum, mesonotum, fore wing, hind wing and the shape of male abdominal abodeme, also aedeagus, connective, genital style and genital plate.

View Publication Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling of the Effect of Grain Size on Final Stage of Sintering Al2O3
...Show More Authors

  This research studies the effect of grain size for the final stage in sintering Al2O3 .The experimental results for α- Al2O3 powder are modeled using ( L2-Regression ) technique in  order to study the effect grain size distribution on densification rate using four kinds for the initial particle size which were ( 1.44 , 2.54 , 0.7-2.54 ,1.15-3.53 ) µm , and for sintering time  (0-241) min. The mathematical simulation for grain size changing shows that the densification rates boots up as the grain size goes lower, this was due to the increase of contact area between the grains.

View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref