Preferred Language
Articles
/
JxYNBYcBVTCNdQwCYi4b
Methods and Challenges in Shot Boundary Detection: A Review

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Sun Jun 30 2024
Journal Name
Journal Of Language Studies
Translation Challenges in Children's Literature: A Comparative Study of Story Narratives

This paper presents the intricate issues and strategies related to the translation of children's books, and it particularly focuses on the comparative analysis of "The Tale of Peter Rabbit" by Beatrix Potter and "Le Petit Prince" (The Little Prince) by Antoine de Saint-Exupéry. The study finds that the typical problems in translation are, idiomatic expressions, cultural reference, and the voice preservation, along side-sheet-specific challenges which each of the text faces. The translator of Potter's work should have skills of transposing all culturally oriented peculiarities of the UK land to the international audience to keep it accessible. On the contrary, "Le Petit Prince" translation will be the process of capturing the abstra

... Show More
Crossref
View Publication
Publication Date
Wed Sep 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Diet and orthodontics- A review

During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Journal Of Legal Sciences
The Compatibility of Iraqi Legislation with the Requirements of the International Financial System in Financing Foreign Trade A Legal Study on the Technical Challenges of Payment Systems and Electronic Payment Methods

The research examines the current Iraqi legislation regarding financing of its foreign trade, its mechanism, and the methods used for money transfers. The research aim is to determine the extent to which these legislations comply with the requirements of the international financial system and identify any legislative shortcomings that negatively affect the value of the national currency, facilitate money laundering, and pose risks to the Iraqi economy and the international financial system simultaneously.

The current reality of financing foreign trade and the mechanism of the foreign currency sale window used by the Central Bank do not constitute genuine financing and have introduced risks, such as money laundering. The Central B

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Pathology - Research And Practice
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Employment and Societal Changes in Iraq Challenges and Policies

This study attempts to focus on there lation ship between employment policies andsocietal changesinIraq.Theconstruction ofoperational policyincommunitiesin crisis remains fraught with challenges and risks, especially in countries that have longoutstanding conflict sand crises, it is important in this context to achieve those policy and build the foundations of human security and poverty alleviation, unemployment, to find effective ways to help the community to achieve stability and reduce the risk of renew edorrepeat the cycleofviolence-butthatwouldrequirearadicalrethinking, including rethinking the way evaluating therisksandchallengesand management.And thatsuchaprojectshouldbe based ona clear roadmap, andthevisionsofdevelopmentanda clea

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
Crossref (8)
Crossref
View Publication