Preferred Language
Articles
/
yhbLcYcBVTCNdQwC5Ury
Impact of North African Sand and Dust Storms on the Middle East Using Iraq as an Example: Causes, Sources, and Mitigation
...Show More Authors

This study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storms from 75 to 200 times annually. North African storms affect the Middle East, with a monthly average exceeding 300 g/m3 in peak dust seasons. To reduce the negative impacts on public health, property, and infrastructure, the study suggests solutions to mitigate them, including reducing carbon dioxide gas emissions to prevent the expansion of drought and the afforestation of the desert with plants adapted to drought using advanced techniques and avoiding land overuse.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weighted Residual Method for the System of Nonlinear Volterra Integral Equations of the Second Kind Using an Exponential Function
...Show More Authors

The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner,  Taylor manner and block- by- block(2, 3, 5).

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
جعفر الصادق
The Role of Criminal Policy in Iraq in Protecting and Improving the Environment
...Show More Authors

Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
THE MACROECONOMIC ENVIRANMENT OF THE FOOD INDUSTRY IN IRAQ AND ITS FUTURE PROSPECTS
...Show More Authors

Food industries are variety to include number of agricultural products (plantbotential and animal) which can be manufactured locally, thus, Iraqi market is full by different types of food products from neighbor countries, because of un equivalence and inability of competence, in away to cover (90%) average of local request need under commercial  opening.

In Iraq although its importance, this industry suffers from difficulties, the most important one is the rising  in  products costs, shortage in agricultural products, experience, and qualification, besides, the challenges , by flooding market in food products and what are contained of higher competitive features from quality and prices side

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of economic factors on the appearance of unequal costs and rationalization of operational decision: An applied research in Wasit State Company for Textile Industries
...Show More Authors

There is a set of economic factors that affect the rationalization of decisions on unexploited resources within the economic unit and here determines the problem of the search for the question of what economic factors cause the emergence of asymmetric costs, and aims to identify these factors in the costs of adjustment to resources, change in The size of the activity of the economic unit, the general trend of sales change in the previous period, and the economic level of the country. Rh measure the impact of these factors on economic unity, and taking into consideration the impact when formulating decisions.

View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The dimensions of organizational confidence and its relationship to achieving the strategic position of banks: is an applied research on a sample of private Iraqi banks
...Show More Authors

The research aims to show the dimensions of organizational trust represented by (administrative policies opportunities for innovation and self innovation and self- realization,availability of information,prevailing organizational values) and its reiationship to achieving the strategic position of banks represented by formation of expectations,buiiding networks,learning operations As the research was applied in each of the banks (middle east)Iraqi investment,Al-Ahly Iraqi, Business Bay, Al- Mansour investment bank),the qusestionnaire was adopted as a tool to collect data and information from the sample number (138)who are in the site (department director, division ,M.division director ,division officer, unit officer)the statistica

... Show More
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Language communication, and the impact of journalism after 2003 AD (a study in the two newspapers, Al-Takahi and Al-Sabah)
...Show More Authors

The methods used by the print media (press) is varied in conveying its messages and its orientations to the readers. But language takes the leading method among these methods, or a real competitor - so far - due to the characteristics and advantages of languages, including: ease, abbreviation, and development, etc.

In the midst of such events, political tensions, and what they carry of the global developments, and among which was the most important the fall of the former Iraqi regime in the spring of 2003, the press had the greatest share, and a large portion on the level of monitoring, analyzing, and interpreting the various consequences of the event. The interpreting of the news varies according to the evolving political trends

... Show More
View Publication Preview PDF
Crossref