Preferred Language
Articles
/
yhdaPo4BVTCNdQwCqz41
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Enhance Similarity Measure of Ontologys' Concepts
...Show More Authors

The field of identification of similarity was considered a subject of research strongly recommended in the areas of semantic web, artificial intelligence and linguistic literature. In this paper a new similarity measure is proposed based on the Wu and Palmer measure. This measure is applied on the domain of the pedagogical ontology. Results obtained showed that the new measure gives better relevance of the similarity values compared to the approach of Wu and Palmer and it appears that the proposed measure is advantageous because obtained results showed that it is faster and capable of obtaining results to concepts not located in the same path.

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Adapting the rhetorical concepts architecturally Excerption and inclusion as example
...Show More Authors

Excerption and inclusion are two terms in Arabic rhetoric. The excerption is defined as a taking a part of text from Holly Quran or Hadith and put it in a poem, verse line, or put it in a prose text. But the linguistics expand the concept of this term to include taking from another sciences and knowledge, like Grammar, Philology, and Prosody.
Inclusion is defined as taking a verse line or part of verse line from another poet to put it in a new poem, it is necessary that the poet who take the text should declare it, and if he hides it, it will be plagiarism.
This search is use these two terms in architecture, we have now new two terms in architecture, first one; architectural excerption, it means the designer takes a part of religio

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weak Pseudo – 2 – Absorbing Submodules And Related Concepts
...Show More Authors

      Let  R  be a commutative ring  with identity  and  E  be a unitary left  R – module .We introduce  and study the concept Weak Pseudo – 2 – Absorbing submodules as  generalization of weakle – 2 – Absorbing submodules , where a proper submodule  A of  an  R – module  E is  called  Weak Pseudo – 2 – Absorbing  if   0 ≠ rsx   A   for  r, s  R , x  E , implies that  rx   A + soc ( E ) or  sx  A + soc (E)  or   rs  [ A + soc ( E ) E ]. Many basic  properties, char

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 15 2020
Journal Name
Pharmacy Practice
Barriers to healthcare access for Arabic-speaking population in an English-speaking country
...Show More Authors

Objective: To identify barriers to healthcare access, to assess the health literacy levels of the foreign-born Arabic speaking population in Iowa, USA and to measure their prevalence of seeking preventive healthcare services. Methods: A cross-sectional study of native Arabic speaking adults involved a focus group and an anonymous paper-based survey. The focus group and the Andersen Model were used to develop the survey questionnaire. The survey participants were customers at Arabic grocery stores, worshippers at the city mosque and patients at free University Clinic. Chi-square test was used to measure the relationship between the characteristics of survey participants and preventive healthcare services. Thematic analysis was

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Oct 18 2018
Journal Name
European Journal Of Organic Chemistry
PdII-Mediated Oxidative Amination for Access to a 9-Azabicyclo[4.2.1]nonane Compound Library and Anatoxin-a
...Show More Authors

View Publication Preview PDF
Crossref (4)
Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
SURVEY ON VANET TECHNOLOGIES AND SIMULATION MODELS
...Show More Authors

Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Multiplicity of Accounting Concepts and it’s Impact on Thinking and Practical Applications
...Show More Authors

Accounting profession has been survived for long time and expected to survive in future, with out basing on theory in the field of practical practice . But there are numerous problems which emerge from the practical practice, their solution needs to be based on generally accepted accounting theory. The results of the researches in this field since the beginning of the last century unfolded the difficulty of formulating theory in accounting , but possible to formulate several accounting

مجلة العلوم الاقتصادية والإدارية

المجلد 18

العدد 69

الصفحات  318-  332  

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Banking Entrepreneurial requirements: Models for selected countries: Models for selected countries
...Show More Authors

The research aims to identify the requirements of banking Entrepreneurial in Saudi Arabia and Singapore, where banking Entrepreneurial is an important way to lead employees to acquire the experience and knowledge required by the banking environment, so we note the pursuit of the banking management to acquire new technology proactively and distinctively to compete with others through the introduction of modern technologies that help senior management to develop new banking methods adaptable to the surrounding environmental changes. The problem of research highlights the extent to which the requirements of banking Entrepreneurial are applied in Saudi Arabia and the Republic of Singapore and will be addressed through three investigation

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref