Preferred Language
Articles
/
GhYUyogBVTCNdQwCGoLS
ROLE OF METAPHOR IN PUPPET IMPLEMENTATION (ON THE EXAMPLE OF D. RUBINA'S NOVEL «PETRUSHKA'S SYNDROME»)
...Show More Authors

The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Role of the executive in federal experiences: a study of selected models
...Show More Authors

Receipt date:06/23/2020 accepted date:7/15/2020 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License

The executive authority differs from one country to another, as it differs from a federal state to another according to the nature of the applied political systems, so this research focused on federal states according to their political systems, then going into the details of the executive authority and its role In the federal states by referring to the four federal experiments

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 13 2019
Journal Name
Al–bahith Al–a'alami
The role of radio advertising in promoting purchasing decisions of Iraqi citizens
...Show More Authors

This research aims to identify the role of radio advertising in promoting purchasing decisions of Iraqi audiences, especially that the placement of the announcement through the Iraqi radio stations dealt with a little of Iraqi researchers, and the goal of the research to know the extent of public exposure to the radio advertising through Iraqi radio and patterns of exposure,disclosure of the reasons for public hearing of the radio advertisement, identifying the most important factors influencing the decision to buy in the radio advertisement, this research is descriptive in terms of type as the researcher used the survey method,questionnaire and scale for data and information collection, the sample was selected according to the purp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The Role of Information Technologies in the Management and Sustainability of Land Use in Future Cities
...Show More Authors

The most important contemporary issues which related to the survey of the influence of communication development technology to land use sustainability. The research aims to explain the changes that happened in the quality & land use activities performance by understanding the transformations due to modern technology and its impact on current uses and its impact on changing functional relationships between those uses to create new combinations or hybrid uses.Research will follow the analytical descriptive approach in presenting the problem of research. Research has several conclusions & recommendations, one of conclusions is the change of the place concept and its relation to changing the concept of land use and its sustai

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 13 2024
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic sensitivity in organizational immunity - analytical research in the Iraqi Ministry of Education
...Show More Authors

The current research aims to find out the effect of strategic sensitivity in enhancing organizational immunity at the leadership levels in the Iraqi Ministry of Education, as the strategic sensitivity variable includes two dimensions (strategic foresight and strategic Insight), and the organizational immunity variable addresses three dimensions (organizational learning, organizational memory and organizational DNA). The main purpose of this research was related to the extent to which the Ministry’s immunity was achieved through the role played by strategic sensitivity. A sample of (349) individuals was selected . The questionnaire was relied upon to collect data, and the number of questionnaires suitable for analysis was (330). Re

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of SMEs in Economic Development in Jordan: The Case of Al Hassan Industrial Estate
...Show More Authors

This study aimed at highlighting the role of small and medium enterprises in bringing about economic development in Jordan. The study examined the impact of the number, size of investment and the number of jobs provided by these enterprises on the rate of growth in gross domestic product (GDP) as an indicator for economic development. To achieve its objectives, the study adopted descriptive and quantitative analysis. A linear multi regression model was developed with a growth rate of GDP as dependent variable and the number of institutions, size of investment, and the number of job opportunities as independent variables. The study concluded that each increase by one small or medium enterprise lead to an increase in the rate of gr

... Show More
View Publication Preview PDF
Crossref