This paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show MoreThe Carbonate-clastic succession in this study is represented by the Shuaiba and Nahr Umr Formations deposited during the Albian - Aptian Sequence. The present study includes petrography, microfacies analyses, and studying reservoir characterizations for 5 boreholes within West Qurna oil field in the study area. According to the type of study succession (clastic – Carbonate) there are two types of facies analyses:-Carbonate facies analysis, which showed five major microfacies were recognized in the succession of the Shuaiba Formation, bioclastic mudstones to wackstone, Orbitolina wackestone to packstone, Miliolids wackestone, Peloidal wackestone to packstone and mudstone to wackestone identified as an open shelf toward the deep basin.
... Show MoreBackground: The longevity of any prosthesis depends on the materials from which it was fabricated, that is why, defects in the material properties may reduce the service life of prosthesis and necessitate its replacement. The aim of this study was to evaluate the effect of adding different concentrations of Polyamide-6 (Nylon-6) on the tear and tensile strength of A-2186 RTV silicone elastomer. Materials and Methods: 80 samples were fabricated by the addition of 0%, 1%, 3% and 5% by weight PA-6 micro-particles powder to A-2186 platinum RTV silicone elastomer. The study samples were divided into four (4) groups, each group containing 20 samples. One control group was prepared without PA-6 micro particles and three experimental groups were pr
... Show MoreThis study was designed to compare the effect of two types of viral hepatitis A and E (HAV
and HEV) on liver functions in Iraqi individuals by the measurement of biochemical changes
associated with hepatitis.
The study performed on 58 HEV and 66 HAV infected patients compared with 28 healthy
subjects. The measured biochemical tests include total serum bilirubin, serum transminases (ALT
and AST) alkaline phosphatase (ALP) and gamma glutamyl transferase (GGT).
The study showed that adolescent and young adults (17-29) years, were mostly affected by
HEV while children (5-12) years were frequently affected by HAV. The severity of liver damage in
HEV patients was higher than HAV patients as a result of high serum transa
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThis research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreThe artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet
... Show More