Preferred Language
Articles
/
jnhm-148
A NEW SPECIES OF THE GENUS POLLENIA ROB.-DESVOIDY, 1830 (DIPTERA : CALLIPHORIDAE) FROM IRAQ
...Show More Authors

This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Meaning From a Logical Perspective
...Show More Authors

This paper is intended to focus on the existing relation between 'logic' and 'meaning', and how 'meaning' is looked at through logical perspective. Besides, this paper adopts simple logical symbols to represent some aspects of meaning.

    Since meaning is still regarded as a thorny area that needs further study to determine its nature and borderline, this paper proposes to resort to logic and logical rules. This paper points out how logical rules are used and how they clarify some oblique sentences. The paper also sheds light on how meaningful sentences are logically symbolized and how logic can define the borderline of meaning in an adequate manner. This paper hypothesizes that logic, l

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Analysis of a Fixed Bed Absorber Used for the Removal of Pollutants from Water
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jun 20 2025
Journal Name
Al–bahith Al–a'alami
The Challenges of Forming A Culture of Change in Iraq (Self-Obstacles to the Media Role)
...Show More Authors

The Iraqi culture faced a set of challenges that can be diagnosed with the most prominent features as follows:

  1. The dominance of authoritarian political systems which entails authoritarian regimes with the absence of contemporary political concepts of human rights.
  2. The prevalence of non- informed cultural systems which have the shortage of capabilities that enable them to activate cultural elements in positive references, historical, or seclusion on itself and not be able to interact with the current active cultures.
  3. Stagnant economic conditions have not had a decent life for individuals, or a certain level of well-being, as well as poor services and others.
  4. Social life controlled by the prevai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Heliyon
Determining the bacterial and viral meningitis trend in Iraq from 2007 till 2023 using joinpoint regression
...Show More Authors

View Publication
Scopus Clarivate Crossref