Preferred Language
Articles
/
bRb6tIcBVTCNdQwCzV1Z
Exact solutions to linear and nonlinear wave and diffusion equations
...Show More Authors

Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
DNA-damage in blood of welders occupationally exposed to welding fume using comet assay
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Transformations of the body from traditional expression to subjectivity : Marina Abramivic as a model.
...Show More Authors

The way artists deal with body in their artistic works has had so many forms and methods, whether as an object for their drawings or as a material to create live artistic performances that relate to the idea of correspondence and interaction between different artistic categories such as: drama, dance, and painting as it is the case of the artist Marina Abramovic who has always used her body as an artistic unit to generate meaning and to perform her lively shows.
To go deeper into her career, our work was divided into 3 sections:
The first section was devoted to follow the main artistic stages that her body had gone through, starting with paintings she performed using concepts based on acting, simulation and nudity and ending wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting statistical methods for controlling the quality of drinking water to achieve customer satisfaction
...Show More Authors

The current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archive
Isolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
...Show More Authors

solation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency

Scopus (2)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The reasons for the failure of Bishara CO2 compressor belonging to Southern Fertilizer Company
...Show More Authors

In this research study failed Annunciation No. 10 for the fourth phase of the pressure of carbon dioxide of the company for Southern Fertilizers and repeated the failures more than once for the same gospel was a detailed study of the gospel included a series tests for properties Mechanical and Structural addition to the tests microscopic and scanning electron microscope shows m This study parameters and a failure Elal well as the existence of an old internal cracks in the metal of the Annunciation

View Publication Preview PDF
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref