Preferred Language
Articles
/
GhYUyogBVTCNdQwCGoLS
ROLE OF METAPHOR IN PUPPET IMPLEMENTATION (ON THE EXAMPLE OF D. RUBINA'S NOVEL «PETRUSHKA'S SYNDROME»)
...Show More Authors

The article examines metaphors as one of the fundamental means used by D. Rubina when writing the novel “Parsley Syndrome” to form images of dolls as equal heroes of the work. The author of the article continues research related to the work of Dina Ilinichna Rubina, a representative of modern Russian prose.

Publication Date
Tue Dec 16 2008
Journal Name
Journal Of Planner And Development
The Role of Islam in Developing Some Basic Concepts in Town Planning
...Show More Authors

The arise of Islam as a multidimensional changing phenomenon with its own revolutionary and comprehensive character was inherent with a lot of alterations in social aspects , and this is explicit particularly in the scope of urban life and town planning . Essentially, Islamic style of life has its own urban identity. The urbanization process in Islam has been developed across two integrated sides, the first one concerned on ideational and theoretical aspects , while the other associated with practice .Many urban centers emerged during the Islamic era since the erection of Basrah , the first Islamic town in the middle of the 7th. centaury. Some contemporary urban concepts , both environmental and social could be noticed in Islamic

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Role of TV Programs in Spreading the Culture of Community for Peace: Studying the Attitudes of the Publics towards a Program entitled Mosamih Kareem on YouTube
...Show More Authors

The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this program. It is a descriptive study and it follows the approach survey method.  In this study, the spatial framework is limited to the program of almosamih kareem on YouTube, while the temporal framework is concerned with the episodes that are raised on YouTube from the second half of 2014 to 2015 of almosamih kareem program. The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 17 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Some Games Via (D, DL) Compact Topological Groups
...Show More Authors

    The aim of our work is to develop a new type of games which are related to (D, WD, LD) compactness of topological groups. We used an infinite game that corresponds to our work. Also, we used an alternating game in which the response of the second player depends on the choice of the first one. Many results of winning and losing strategies have been studied, consistent with the nature of the topological groups. As well as, we presented some topological groups, which fail to have winning strategies and we give some illustrated examples. Finally, the effect of functions on the aforementioned compactness strategies was studied.  

Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Lack of Association of the HMGA1 Gene Variants with Metabolic Syndrome Risk and Response to Oral Anti-Diabetic Drugs
...Show More Authors

Background: Metabolic syndrome (Mets) is partially heritable. High mobility group AT-hook1 (HMGA1), an architectural transcription factor, affects the homeostasis of glucose. The marked inter-individual differences between T

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref