Preferred Language
Articles
/
LReSjpABVTCNdQwCH42m
A Multimodal Discourse Analysis of Visual Images in UNHCR Reports on Displaced Iraqis
...Show More Authors

The advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the value of images as semiotic resources in conveying multi-layered meanings. Applying Kress and Van Leeuwen"s (2006) Multimodal Discourse Analysis (MDA) of analyzing the images in UNHCR reports on the displaced Iraqis succeed in revealing their semiotic structures. The analysis of the selected images shows various relations existed between the participants and the viewers on the visual level through employing different visual modes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue May 11 2021
Journal Name
Egyptian Journal Of Medical Human Genetics
Molecular analysis of CFTR gene mutations among Iraqi cystic fibrosis patients
...Show More Authors
Abstract<sec> <title>Background

Cystic fibrosis (CF) is an autosomal recessive multisystem disease that results from mutation(s) of the cystic fibrosis transmembrane conductance regulator (CFTR) gene. More than 2100 mutations and polymorphisms have been reported in this gene so far. Incidence and genotyping of CF are under-identified in Iraq. This study aims to determine the types and frequencies of certain CFTR mutations among a sample of Iraqi CF patients. Two groups of patients were included: 31 clinically confirmed CF patients in addition to 47 clinically suspected patients of CF. All confirmed pa

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 29 2021
Journal Name
International Journal Of Applied Mechanics And Engineering
Unified Methodology for Strength and Stress Analysis of Structural Concrete Members
...Show More Authors
Abstract<p>In this paper, a methodology is presented for determining the stress and strain in structural concrete sections, also, for estimating the ultimate combination of axial forces and bending moments that produce failure. The structural concrete member may have a cross-section with an arbitrary configuration, the concrete region may consist of a set of subregions having different characteristics (i.e., different grades of concretes, or initially identical, but working with different stress-strain diagrams due to the effect of indirect reinforcement or the effect of confinement, etc.). This methodology is considering the tensile strain softening and tension stiffening of concrete in additio</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Sep 06 2022
Journal Name
Methods And Objects Of Chemical Analysis
Spectrophotometric Analysis of Quaternary Drug Mixtures using Artificial Neural network model
...Show More Authors

A Novel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twenty four samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.

Scopus (2)
Scopus
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Crossref (13)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iranian Journal Of Materials Science And Engineering
First-Principles Analysis of Cr-Doped SrTiO3 Perovskite as Optoelectronic Materials
...Show More Authors

The influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga

... Show More
Scopus (8)
Scopus Clarivate
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref