Preferred Language
Articles
/
jxcTa5IBVTCNdQwC_q8K
Social Media and Language Evolution: A Review of Current Theoretical Efforts on Communication and Language Change
...Show More Authors

This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cyber slangs, initialisms, morphological shortenings, etc. Much importantly, previous research has suggested that the larger the network size is, the more will be its effect on language evolution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Carotid Intima-Media Thickness in Rheumatoid Arthritis Detected by Doppler Ultrasound
...Show More Authors

Background: The excess mortality associated with
rheumatoid arthritis is largely due to
cardiovascular disease. Rheumatoid arthritis is of
primary importance in atherogenesis. The intimamedia thickness of extracranial carotid arteries is a
measurable index of the presence of
atherosclerosis.
Objective: To assess carotid intima-media
thickness in rheumatoid arthritis by Doppler
ultrasound.
Methods: Fifty two Iraqi patients with rheumatoid
arthritis were studied and compared with another
fifty two, healthy individuals matched for age and
sex as a control group. Full history was taken and
complete clinical examination was done for all
individuals in both groups. Rheumatoid arthritis
diagnosis was

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 12 2025
Journal Name
Al–bahith Al–a'alami
The Role of Media Coverage of the Iraqi Satellite Channels in Shaping Public Attitudes towards Terrorism (a Field Study of a Sample of an Audience of the City of Baghdad)
...Show More Authors

Violence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.

The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculation of The Fill Factor of N749/〖TiO〗_2 Solar Cells
...Show More Authors

        In this paper, the fill factor of the N749/TiO2 solar cell is studied and calculated using the analysis method at standard conditions; i.e., T=300k  and  100 mW/cm2 irradiation.. The current density was derived and calculated using the donor-acceptor model according to the quantum transfer theory in DSSC solar cells. We estimate the influence parameters in DSSC that's an equivalent circuit to the I-V curves for three solvents. The fill factor parameters of the N749/TiO2 device are found to be 0.137,0.146 and 0.127 with Butanol, Ethanol           and Acetonitrile for carrier concentration .  1018 1/cm3 respectively. The photovoltaic characteristics ISc  , Vco<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Theoretical study for the calculation of some attenuation parameters of polymeric composites
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
studies of human interferon a B and Y activities on diffrent cell
...Show More Authors

Human interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects

View Publication Preview PDF
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref