Preferred Language
Articles
/
kBcoFY4BVTCNdQwC3zH4
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Deposit insurance system and its role in financial security for the period (2010-2018) Study the experiences of Selected countries with reference to Iraq
...Show More Authors

Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Care of the Holy Quran In the era of the Noble Prophet
...Show More Authors

This is a brief research in which I tried to briefly explain the care that the Holy Qur’an received during the era of the Prophet, may God bless him and grant him peace, from the Prophet, may God bless him and grant him peace, and all of his honorable companions, may God bless him and grant him peace. I made this research in an introduction and two chapters, the first chapter I made it entitled: About the Holy Qur’an, in which I talked about general investigations about the Holy Qur’an, such as the definition of the Holy Qur’an and the difference between it and the hadith Qudsi and the hadith of the Prophet, then I mentioned a part of the virtues of the Holy Qur’an in general and the virtues of some surahs in particular, and th

... Show More
View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Communication in art Education
...Show More Authors

The aim of this research is to find approaches between the communicative process and the teaching of art education. Postgraduate/Masters studies for the academic year 2022-2023.
In the light of this tool, the researcher reached a number of results, most notably: The art education teacher performs his communicative role correctly, as well as his ability to use verbal and non-verbal expressions and positive reinforcement clearly for the benefit of his students, and stimulates the largest number of their senses

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Optical Communications
320 Gbps Free Space Optic Communication System Deploying Ultra Dense Wavelength Division Multiplexing and Polarization Mode Division Multiplexing
...Show More Authors
Abstract<p>This work aims to investigate the integrated ultra-dense wavelength division multiplexing (UDWDM) and polarization division multiplexing (PDM) schemes incorporated in the free space optic (FSO) communication system. Erbium-doped fiber amplifiers (EDFAs) are used as post and pre-amplifiers in the proposed UDWDM–PDM–FSO system to boost the transmission power for increasing the distance. Thirty-two channels are transported over the FSO link to realize the total data transmission of 160 and 320 Gbps with 0.08 and 0.1 nm channel spacing, respectively. Results are also reported with non-return to zero modulation schemes. The performance of the proposed UDWDM–PDM–FSO transmission sys</p> ... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
ON G-OPEN SET
...Show More Authors

A new class of generalized open sets in a topological space, called G-open sets, is introduced and studied. This class contains all semi-open, preopen, b-open and semi-preopen sets. It is proved that the topology generated by G-open sets contains the topology generated by preopen,b-open and semi-preopen sets respectively.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Conductivity Study of DTAB in Water and Ethanol-Water Mixture in the Presence and Absence of ZnSO4
...Show More Authors

The physicochemical behaviour of dodecyltrimethylammonium bromide (DTAB) in water and ethanol-water mixture in the presence and absence of ZnSO4 were studied by measuring the conductivity at 298.15 K. The pre-micellar (S1) and post-micellar slopes (S2) were obtained and calculated the degree of dissociation (α) and the critical micelle concentration (cmc). With an increase in ethanol content, the cmc and α of DTAB increased whereas, in the presence of ZnSO4, the cmc and α decreased. By using cmc and α, thermodynamic properties as the standard free energy of micellization ( ) were evaluated. With an increase in ethanol content, the negative values of  are decreased indicating less spont

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Photo citation request in examples   Of ascetic poetry in the first Abbasid era
...Show More Authors

Photo citation request in examples   Of ascetic poetry in the first Abbasid era

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Employment of Electronic Communication Technology in Public Relations: Employment of Electronic Communication Technology in Public Relations
...Show More Authors

This research aims at studying the websites of Iraqi ministries to determine the extent of the use of electronic communication in the practice of public relations' activities through these sites, which represent a formal means of communication between the ministry and its people.
The research consists of three chapters: chapter one studies the methodological framework of the research; chapter two includes three units: unit one studies technologies of electronic communication including its concept, features and types; unit two studies electronic publications i.e. its concept and features; and unit three deals with designing the electronic websites .it ends with chapter three which is divided into two sections: section one studies the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref