Preferred Language
Articles
/
Wha6qogBVTCNdQwCbHqZ
Enrichment of Vocabulary and the Formation of Grammatically Correct Speech of Foreign Students When Studying the Text of a Literary Work
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The economic effects of money laundering and the role of banking service in combat it: a prospective study of a sample
...Show More Authors

Money laundering is consider a crime in legal perspective and aphenomenon of negative effects in economic and Social perspective for thevarious countries of the world by the diversity of their economies to make thebadly damaged in the banking service and its reputation in some cases may leadto bankruptcy of banks, and the fact that banks is one of the most importantcircles that revolve the illicit funds, Due to its branched the banking operations,speed and overlap and increase it's complicated with the progress of bankingoperations and the use of electronic services modern here's challenges atvarious levels between the application of the legislation to combat moneylaundering and between actual fact it must find ways and means of legislat

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Study the Effect of annealing temperature on the Structure of a-Se and Electrical Properties of a-Se/c-Si Heterojunction
...Show More Authors

In this work Study effect of annealing temperature on the Structure
of a-Se and electrical properties of a-Se/c-Si hetrojunction have been
studied.The hetrojunction fabricated by deposition of a-Se film on c-
Si using thermal evaporation.
Electrical properties of a-Se/ c-Si heterojunction include I-V
characteristics, in dark at different annealing temperature and C-V
characteristics are considered in the present work.
C-V characteristics suggested that the fabricated diode was
abrupt type, built in potential determined by extrapolation from
1/C2-V curve. The built - in potential (Vbi) for the Se/ Si System
was found to be increase from 1.21 to 1.62eV with increasing of
annealing temperature

View Publication Preview PDF
Publication Date
Mon Jun 20 2022
Journal Name
International Journal Of Early Childhood Special Education
The Impact of the Visual Teaching Strategy by using Infographic in mathematics achievement for intrmediate grade students
...Show More Authors

The research aims to identify the impact of the visual teaching strategy by using infographics mathematics achievement for intermediate grade students. The experimental research method was adopted, as the experimental design of two independent and equal groups with a post test was used, whereas the experiment was applied on a sample consisting of (52) male students from first- intermediate grade students in (Al-Haq Al-Mubin intermediate school for Boys) of the General Directorate in Anbar Governorate - Department Education in Fallujah for the academic year (2021-2022), and the research sample was distributed equally on the two research groups, and Division (B) was chosen randomly to be the experimental group, while Division (A) was the cont

... Show More
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The martial rights and duties (Rights and duties of a woman and a man)
...Show More Authors

This research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Journalism of Paper Newspapers in Light of the Competition of the Electronic Press / (A Field Study of Yemeni Daily Newspapers)
...Show More Authors

The researcher seeks to get scientific facts through knowing the relationship between the priorities of Yemeni audience in follow-up paper daily newspapers compared to surfing publics the online journalism sites and the nature of information obtained from online journalism sites and printed paper newspapers and the impact of the daily newspapers in the priority of issues and political events among a sample of a group of Yemeni readers in order to identify the extent to keep up the paper daily newspapers of the development in the field of online journalism and the extent of reading paper newspapers under the intense competition by online journalism sites, and are paper newspapers able to keep pace with the actual developments provided by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Virology
Transient expression of cauliflower mosaic virus (CaMV) P6-GFP complements a defective CaMV replicon to facilitate viral gene expression, replication and virion formation
...Show More Authors

Over the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here w

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref