Preferred Language
Articles
/
jcois-352
Trends of poetic purposes towards praise: Dabal al-Khuzai's poetry is a model
...Show More Authors

Poetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction of praise towards spinning and the second axis included the direction of praise towards lamentation, either axis
The third was entitled the direction of praise towards wisdom, came the fourth axis entitled the direction of praise towards
The fifth section included the trend of praise towards the yeasts, and the conclusion came to include the totality
The findings of the research, after the conclusion provided a list of sources and references that inspired them
Literary, artistic and historical material, and then the conclusion of the message in English.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
University Of Baghdad
New Analytical Methods for Drugs Analysis A Comparative Study
...Show More Authors

Four different spectrophotometric methods are used in this study for the determination of Sulfamethoxazole and sulfanilamide drugs in pharmaceutical compounds, synthetic samples, and in their pure forms. The work comprises four chapters which are shown in the following: Chapter One: Includes a brief for Ultraviolet-Visible (UV-VIS) Absorption spectroscopy, antibacterial drugs and sulfonamides with some methods for their determination. The chapter lists two methods for optimization; univariate method and multivariate method. The later includes different types, two of these were mentioned; simplex method and design of experiment method. Chapter Two: Includes reaction of the two studied drugs with sodium nitrite and hydrochloric acid for diazo

... Show More
Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
A Large Anterior Urethral Calculus Presenting as Urethrocutaneous Fistula
...Show More Authors

Presentation of urinary calculus ranges from painful urination to acute retention. Diagnosed by x-ray pelvis and non-contrast CT and removal of stone by various methods is the management. Variety in symptoms, sometimes make clinical diagnosis difficult until radiological investigations confirm it. In this case presentation, initial diagnosis was made of Urethrocutaneous fistula may be due to distal stricture, but on investigating, he was diagnosed as urethral calculus in urethral diverticulum , as the reason for his symptoms

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Mannich Bases: Synthesis, Pharmacological Activity, and Applications: A Review
...Show More Authors

      The Mannich reaction is one of the most important types of organic chemistry fundamental reactions. It is a crucial stage in the production of various medicines, natural goods, and industrial chemicals. Chemists' imaginations have always been piqued because of this. In general, the Mannich reactions can be used as part of a tandem reaction sequence to produce complex target molecules in an elegant and often easy manner. The following article examines and summarizes methods for synthesizing Mannich derivatives, in addition to offering a survey of recent advancements in several fields’ applications of the Mannich reaction, such as biological applications, antimicrobial activity, anticancer activity, anti-inflammation and

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Sat Dec 21 2024
Journal Name
Journal Of Surgical Case Reports
Lumbosacral posterior meningocele in adult patient: a case report
...Show More Authors
Abstract<p>Spinal dysraphism is the incomplete fusion of the neural arch, which can be seen as an occult or open neural tube defect. Meningoceles are a form of open neural tube defect characterized by cystic dilatation of the meninges containing cerebrospinal fluid without the involvement of neural tissue. Neurosurgical intervention is necessary in the newborn period since survival in advancing ages is often impossible. Therefore, meningoceles are rarely reported in adulthood. Here, we discussed a case of a 23-year-old female who presented with a meningocele in the lumbosacral area since birth, which had not been operated on. Surgical management and intraoperative findings are also discussed.</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref