Preferred Language
Articles
/
jcofarts-681
The Factors influencing to the cognition operation & its Data: وفاء جاسم محمد
...Show More Authors

The present research deals with the influencing factors which depends on the way perceptual of the graphic designer which enters in the design logos of the loco European health, where the search include four chapters, the researcher reviewed in the chapter 0ne the methodical frame of the research ,as reviewed in the second chapter the theoretical frame, and the previous studies which included three sections, the first section included the perceptual understandable and types of it, and the second section included the influencing factors in the designer perceptual ways and its division . While the third section included the perceptual in graphic designer through the percepted shapes and the relation with ground and colors for express the idea and the content of the art work and determine the formal organization which control in the perceptual field for the designer to embody, the designer idea and emerged from the theoretical from the indicators as scientific material which helped the researcher in her steps and her method for the research to analyzed five samples researchable content in chapter three which called steps chapter while the four chapter which the researcher arrived to it included the showing for the results recommendations and suggestions

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of mergers and acquisitions in the stock returns and financial performance - An Empirical Study of major international companies to the pharmaceutical industry-
...Show More Authors

Research aims to identify the immediate impact of the announcement of mergers in the stockholders and the feasibility of gain abnormal return and benefiting from  asymmetric information during the announcement that unite 30 days before the announcement of the merger, and announcement day, and 30 days after the announcement of the merger. It was the largest and most important mergers and acquisitions pick that occurred during the global financial crisis, specifically in health care/pharmaceutical industry, Pfizer and Wyeth merger with Novartis acquisition on Alcon. search has adopted three hypotheses: the first hypothesis that ((achieves the target company's shareholders positive abnormal return (or negative) during and befor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Professional Development and its Relationship with some Variables in the Light of Sullivan Theory among Male and Female Teachers in the Basic Education Schools in Sultanate of Oman: سالم بن ناصر بن سعيد الكحالي
...Show More Authors

The study aims to reveal the level of professional development in basic education schools from the male and female teachers’ viewpoint in the Sultanate of Oman. It further aims to examine its relationship with some variables in light of Sullivan theory, and the differences in the level of professional development (teachers’ skills, professional participation, professional development problems) according to the gender variable, and the educational stage (first cycle/ second cycle). The study sample consisted of (93) teachers distributed as such: (46) male teachers, and (47) female teachers. A questionnaire was prepared and applied to measure the level of the professional development of the male and female teachers. The questionnaire c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 03 2020
Journal Name
College Of Islamic Sciences
Rulings of magic  and its treatment in Islam
...Show More Authors

Praise be to God, Lord of the worlds, and the best of prayers. He has completed the delivery of our master Muhammad, his family, and all his companions. O God, bring us out from the darkness of illusion, honor us with the light of understanding, open us with knowledge of knowledge, facilitate our morals with dreams, and make us who listen to the saying and follow their best.
And after ..

Since ancient times, magic was mentioned in many books in the history of the civilizations of ancient peoples, where the first emergence of human civilizations, the oldest of which is the Mesopotamian civilization, the Chinese civilization, and the Pharaonic civilization in Egypt, where concepts prevailed based on the charlatans and sorcery an

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Oct 31 2025
Journal Name
Mathematical Modelling Of Engineering Problems
Heterogeneous Traffic Management in SDN-Enabled Data Center Network Using Machine Learning-SPIKE Model
...Show More Authors

Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 17 2016
Journal Name
International Journal Of Computer Applications
Analysis of Wind Speed Data and Annual Energy Potential at Three locations in Iraq
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref