Preferred Language
Articles
/
abaa-846
The Iraqi public's uses of digital television and cinema sites ( A field study ): Research extracted from a master's thesis
...Show More Authors

The research problem revolves around the Iraqi public's use of digital television and cinematic websites، and their importance to the academic study and society، as it examines the public's relationship with these websites، usage habits، and the reasons for their interaction with them. And for the prevalence of this phenomenon of use، it was necessary to address the intensity، intentionality، and timing of use to theoretically root the subject of the study، which is one of the modern studies in Iraq and the Arab world. The survey approach، where the research was based on the theory of uses and gratifications that confer positivity and activity on the mass media audience.

     The researchers designed a standardized survey form with the scale as a research tool to which the two observation and interview tools were added، and the study community was from the Iraqi public (15 years and over)، and an available sample was selected from the population of the city of Baghdad consisting of (772) singles that formed the sample of the total study، and the research reached several results، topped by the widespread use of television and cinematic websites over the Internet by the Iraqi public، represented by the residents of the city of Baghdad، through the temporal and spatial diversity of use، the quality of the devices used for follow-up and the various motives

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
A review on hybrid methods using playfair and RSA techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Epitoanyag - Journal Of Silicate Based And Composite Materials
Flame retardants, their beginning, types, and environmental impact: a review
...Show More Authors

The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Aug 20 2020
Journal Name
Talent Development & Excellence
Turn-Taking in Conversation between a Chef and Boss and among Chefs
...Show More Authors

DBN Rashid, Talent Development & Excellence, 2020

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Molecular Structure
A new thiazoldinone and triazole derivatives: Synthesis, characterization and liquid crystalline properties
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Mar 17 2026
Journal Name
Al–bahith Al–a'alami
Public relations of Iraqi companies and their role in the marketing of national products
...Show More Authors

based on the importance of public relations in companies, I will discussed the issue of public relations and its role in marketing national products, given what these companies represent of great importance in terms of providing products and services to large segments of Iraqi society, which necessitated the need to search and investigate the role and importance of activities that Provides public relations in Iraqi companies in all categories( public, private and mixed).
the study tables and theirinterpretations, results and recommendations, and the studyreachedseveralresults, including the positive and the negative, the positive including the success in marketing the products by the number of companies in the Fairswhere the level of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Analyzing the likeness of fundamentalists and examples of its jurisprudential applications
...Show More Authors

The new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
The position of the Jews on divinity, lordship, names and attributes
...Show More Authors

Judaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.

View Publication Preview PDF