Preferred Language
Articles
/
QxaJcocBVTCNdQwC90vb
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

Crossref
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Campos En Ciencias Sociales
Leadership and Post-Conflict State Rebuilding: Iraq after 2003 Case Study
...Show More Authors

The Iraqi political and social arena has been characterized, subjectively and objectively, by the weakness of leadership building. This has led to a leadership crisis, which is reflected in the quality of the outcome of the process of rebuilding the state in Iraq. Thus, this building process has lacked the simplest requirements and conditions of success. It has suffered from a major and obvious failure: the situation in Iraq has raised conflict leaders, not constructive leaders, and this confirms the existence of a cultural crisis in the production of conscious, aware leadership compatible with democratic action. The weakness of leadership in Iraq is reflected in a series of ongoing crises that require radical solutions in accordance with l

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 12 2020
Journal Name
The Fourth Annual International Conference On Languages, Linguistics, Translation And Literature (www.llld.ir), 1-2 February 2020, Iran-ahwaz, Book Of Articles, Volume Two
A Study of Susan Glaspell's Regionalism and Ideal Feminism with Special Reference to Her Play Trifles
...Show More Authors

Abstract The main purpose of the research is to clarify and investigate in details about Susan Glaspell’s role in shedding light on the predicament of women in American society in the early twentieth century showing how sense of the place played an important role in limiting the opportunities of female protagonists who try to escape the roles imposed upon them by society. Glaspell lived in the early twentieth century in the Midwest and tackled the important issues like: women's suffrage, birth control, socialism, union organizing when women were not able to vote or sit as a member on juries. Her Feminist cause is quite obvious through her works from her first one act play Suppressed Desire to the final three act play, Alison’s House. Th

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 24 2020
Journal Name
Opción
Hyperbole in poetry: A case study of exaggeration
...Show More Authors

The present study identifies the linguistic means used to realize hyperbole in poetry as a rhetorical device that makes readers experience the beauty of poetic language. To achieve the aim of the study, a model of analysis in accordance with Spitzbardt (1963), Norrick (1982), and McCarthy & Carter (2004) is used. The analysis of data under investigation reveals that hyperbole is a crucial aid used by poets to portrait the real world as imaginative. In conclusion, poets prefer using lexico-grammatical repertoires than lexico-grammatical configurations. Keywords

Scopus
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
...Show More Authors

أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ

... Show More
View Publication
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Asian Journal Of Applied Sciences
Comparison between Expert Systems, Machine Learning, and Big Data: An Overview
...Show More Authors

Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.

View Publication
Crossref (2)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Prepare Maps For Greenhouse Gases With Some Weather Elements For Baghdad City Using Data Observation And Arc-GIS Techniques
...Show More Authors
Abstract<p>Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref