Preferred Language
Articles
/
MELFDJsBMeyNPGM3NNd3
The Impact of AI-Based Pronunciation and Dialogue Apps on English Language Acquisition: A Comparative Phonetic Study of ELSA Speak and Mondly
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
The problems faced by First-grade intermediate students in studying the Arabic language
...Show More Authors

This study investigates the challenges encountered by first-grade intermediate students in learning the Arabic language. It aims to identify specific obstacles that hinder language acquisition and proficiency among this demographic. Through qualitative and quantitative methods, including surveys and interviews with students, teachers, and parents, the research highlights key issues such as limited vocabulary, difficulties in grammar, lack of engagement with the material, and inadequate teaching resources. The findings reveal a complex interplay between cognitive, social, and educational factors that contribute to these challenges. The study underscores the need for targeted interventions, such as enhanced pedagogical strategies and improved

... Show More
Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
fabrication and study the characteristic of PbTelSi
...Show More Authors

In this research has been the manufacture and study the properties of the solar cell type retail hybrid manner thermal evaporation emptiness were studying the properties of the cell at room temperature showed measurements stream circuit behavior linear cell manufacturers reached were calculated efficiency tool cell manufacturers, as well as the expense of workers filling the cell

View Publication Preview PDF
Publication Date
Wed Aug 16 2023
Journal Name
Journal Of Humanities And Social Sciences Research
The impact of the use of hydromassage rehabilitation exercises on the recovery of certain motor potentials of knee roughness sufferers
...Show More Authors

The research included the introduction to the research and its importance as knee joint is an important joint in the human body that is prone to injury. One such injury is knee roughness injury that occurs as a result of the stress of the knee joint and age. The importance of examining the need for the use of rehabilitation exercises, especially in the watercourse system, is highlighted by the fact that the aquatic environment is one of the most important factors helping to alleviate pain and rehabilitate the knee joint and thereby improve the mobility of those with knee roughness. The problem of research is that rehabilitation exercises have been developed in the watercourse system on the basis of scientific bases with a repetitive and sys

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Arab Researcher
The Civil Liability of Hotels toward Victims of Sex Trafficking – A Study in Light of Iraqi and U.S. Law
...Show More Authors

In view of the large profits made by the sex trade on the one hand, and the minor penalties imposed on the traffickers (brokers) compared with the severe penalties imposed on the drug trade and illegal weapons, on the other hand, this trade has become popular and spread in most countries of the world, and the cornerstones of this trade and A safe haven for them is hotels, especially luxury ones with international brands where their guests are rich and some may look for sex for money. Given the great physical and psychological damage to the victims, this research highlights the civil liability of hotels towards these victims in US and Iraqi law.In order not to limit the

... Show More
View Publication
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of the Financial Reporting of Liabilities and Assets of Deferred Income Tax in the quality of Accounting Information
...Show More Authors

Abstract

The research problem Focused about extent adoption of the financial reporting obligations and assets of the deferred income tax attributable to the concepts of accounting theory and whether the tax laws or accounting principles as well as local accounting rules to recognize the obligations and assets of deferred income tax in the financial statements, and what is the impact of the financial reporting of liabilities and assets Deferred tax in the quality of accounting information, and research aims to the statement of the accounting concepts of the theory of financial reporting obligations and assets of deferred income tax, view and analyze the differences in reporting, resulting from a discrepanc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of knowledge Workers in Organizational Excellence Field research in a number of the Iraqi industrial companies
...Show More Authors

The Knowledge Workers is The Largest And Most Powerful Resource Of The Organizational Excellence it is A Precious  Treasure, Therefore Find Organizations at present is looking for them and seek to invest their ideas For achieving excellence, creativity and access to the excellence Organizational , As a result of their importance in terms of engagement and influence in the success or failure of the as an organizational Of The Research is Measuring The Correlation And  Impact Between Knowledge Workers And Organizational Excellence in Sample Of Companies Iraqi Industrial By Standing The Dimensions Of Knowledge Workers ( Characteristics , Skills , Roles , Competencies ) And

... Show More
View Publication Preview PDF
Crossref (1)
Crossref