Preferred Language
Articles
/
nBcuFY4BVTCNdQwCKTED
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.

Scopus Crossref
View Publication
Publication Date
Thu Jul 10 2025
Journal Name
University Of Anbar Sport And Physical Education Sciences
The Impact of the Concept Maps Strategy in the Guided Discovery Method at Learning the Skill of Layup Shooting of Basketball
...Show More Authors

View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Practice of Continuous Auditing in accordance with Technology Acceptance Model: An analytical study of a sample of the Iraqi auditing Offices
...Show More Authors

Abstract

This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The Effect of Related Variables on the Rent Value of Residential Units Case study neighbourhood 409 in the city of Baghdad
...Show More Authors

The rent is one of the sources of investment that generates returns for the owner of the housing unit, and it is also one of the importance expenditure for the tenant.

The importance of this research comes in addressing the deficiency in the field of analyzing the factors affecting the rental value of residential units, which affects many segments of the population of Baghdad.

The aim of this research is analyze and evaluate related variables on the rent value of residential units in neighbourhood 409 in city of BAGHDAD, which is a hypothesis that: There are a set of variables affecting the rental value, including those related to the internal environment of the dwelling, such as: income level, plot area, building area, n

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Selected lssues Of the Imams Of Imam AL- Bazzai in the Book of Prayer from his Book of Fatwas AL- Bazaziyyah
...Show More Authors

The research included four topics: the definition of Imam al-Bazzazi, his scientific life, his sheikhs, his students, his writings, his death, and selected issues of his weight in the book of prayer. The Imam al-Bazazi is the son of Muhammad ibnShihabibn Yusuf. He is known as al-Khardizi al-Khawarizmi. The author did not adopt the definitions of language and terminology, and rarely mention the legal evidence adopted by the scholars in their opinions, and only to mention the views only, and the author, may God have mercy on him in his book on the sources of m The Prophet (peace and blessings of Allaah be upon him) said: "The Prophet (peace and blessings of Allaah be upon him) And fall down the order, the third issue, which is to leave the

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 06 2020
Journal Name
Political Sciences Journal
Self-immuniztion: integration of Russian strategic performance a study in the geopolitical orientation circles "of the stage of president putin"n
...Show More Authors

In the period after the collapse of the Soviet Union in 1991, the Federal Republic of Russia witnessed a setback in the overall strategic performance of the country, as it went through a stage of performance flop between the orientation towards Europe in the era of President Boris Yelsen (1991-1999), or the change of direction towards Eurasia, as the Russian Federation managed After President Vladimir Putin assumed power in 2000, from rebuilding the same state and preserving national unity and social cohesion, as well as building a phased military doctrine that made clear moves in Russian strategic thought and future directions towards regions of eternal importance in Russian strategic perception Lack of a set of motivations based on it:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 10 2025
Journal Name
Modern Sport
Altmtip impact exercises in raising the dynamic range of the skill of the backward straight step down on the balance beam.
...Show More Authors

View Publication
Publication Date
Sun Feb 05 2023
Journal Name
مجلة تكريت للعلوم الادارية والاقتصادية
The role of strategic auditing of human resources management in crystallizing organizational capabilities: A prospective study at the University of Baghdad
...Show More Authors

دور التدقيق الاستراتيجي لإدارة الموارد البشرية في بلورة القدرات التنظيمية دراسة استطلاعية في رئاسة جامعة بغداد

View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
QTAIM study of the bonding in triosmium trihydride cluster [Os3(µ-H)3(µ3-ɳ2-CC7H3(2-CH3)NS)(CO)8]
...Show More Authors

    The Atoms in Molecules (AIM) analysis for triosmium cluster, which contains trihydridede, carbon, carbonyl and 2-methylbenzothiazolide ligands, [Os3(µ-H)33-ɳ2-CC7H3(2-CH3)NS)(CO)8] is reported. Bonding features in this cluster has been analyzed based on QTAIM ("Quantum Theory of Atoms in Molecules") in this work. The topological indices derived from electron density of relevant interactions in triosmium compound have been studied. The major interesting point of the AIM analyses is that the core of part (Os3H3) reveals the absence of any critical points and bond paths connecting any pairs of O

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Mustansiriya Medical Journal
Assessment of Antimicrobial Sensitivity of Bacterial Pathogens Isolated from Post-Cesarean Surgical Site Infection of Patients in Al-Elwiyah Maternity Hospital
...Show More Authors

Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF