This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.
The research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreIn architectural learning, it is difficult to stimulate cultural awareness through the traditional education approaches, which results in historic places being neglected as knowledge sources. This research explores the premise that sketch-based visual storytelling may act as a generative approach to connect cognition, emotion, and behavior in historical contexts. The study adopts a qualitative methodology to explore a learning experience comprising two phases: the first is a formal educational setting, and the second is a historical and cultural context, aiming to investigate the role of sketch-based storytelling in enhancing cultural awareness. MAXQDA was employed to code the students’ storyboards on three levels of cultural awareness, m
... Show MoreAbstract This study explores the extent to which public relations (PR) departments within Traqj governmental institutions are integrating artificial intelligence (AI) applications into their communication activities. The research adresses the growing importanc of AI in enhancing administrative efficieney, communication transparency, and stakeholder engagement. Adopting a descriptive research design, the study relied on an electtonic questionnaire distributed to PR profesionals across various ministries and government bodies, collecting 100 valid responses. The indings reveal that while younger PR practitioners are actively embracing AI, older employees show limited engagement. Most participants acquired AI-related skills through self- learn
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreIn this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show MoreThe current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the
... Show MoreAsmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement inside the reser
... Show More