Preferred Language
Articles
/
EBczEZIBVTCNdQwC2p7B
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

Scopus
View Publication
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Argumentative Elements Of Discours In The Plague For Albert Camus: Les éléments argumentatifs dans le discours de La Peste d’Albert Camus
...Show More Authors

Argumentation is not a contemporary, yet a deep rooted intellectual phenomenon dates back to Romans and Greeks times. The argumentative elements ,the author is trying to convey to the reader, are  linguistic procedures aim at persuading and being persuaded of what is true. The present study traces, through Camus’ novel The plague, the best method to construct argumentative techniques used to express the author’s deep philosophies.

Résumé        

          L’argumentation n’est pas un phénomène intellectuel nouveau, ses origines reviennent aux savants grecs et romains. Elle est une act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 02 2009
Journal Name
Journal Of Baghdad College Of Dentistry
Distribution and localization of ground substance of carbohydrate group in an inflammatory and phenytion induced gingival enlargement using histochemical method
...Show More Authors

Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Employment cost management tools in the fast-track method Of the constructionindustries for the purpose of rationalizing costs: An applied research in the Shatt al-Diwaniya transference project General Authority for projects of irrigation and reclamation
...Show More Authors

The important factor in the success of construction projects is its ability to objective estimate of the cost of the project and adapt to the changes of the external environment, which is affected by a lot of elements and the requirements of the competitive environment. The faces of those projects are several problems in order to achieve particular goals. To overcome these difficulties has been the development of research in the last two decades and turn the focus on the role of the cost of project management, by providing information and assist management in planning and control of the budget among the main elements of the project, namely, (time-cost-quality),The research aims at the possibility of developing and implementing mechanisms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
The Defensive Methods Against Deepfake: Review
...Show More Authors

     Due to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Advances In Bioresearch
Cytotoxicity of Miltefosine against Leishmania majorPromastigotes
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Macton's Method for Developing Non-Linguistic Cognitive Sensory Skills for Autistic Spectrum Children
...Show More Authors

The present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 03 2022
Journal Name
Journal Of Materials Engineering And Performance
Influence of Scanning Velocity on a CoCrMoW Alloy Built via Selective Laser Melting: Microstructure, Mechanical, and Tribological Properties
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Nov 21 2016
Journal Name
Journal Of Medicinal Chemistry
Largazole Analogues Embodying Radical Changes in the Depsipeptide Ring: Development of a More Selective and Highly Potent Analogue
...Show More Authors

View Publication
Scopus (30)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 20 2012
Journal Name
International Journal Of Computer And Information Engineering
An Optimal Algorithm for HTML Page Building Process
...Show More Authors

An Optimal Algorithm for HTML Page Building Process

View Publication Preview PDF