Preferred Language
Articles
/
abaa-109
The Digital Presence of Algerian Females via Virtual Satellite Channels: Analytical Study of Women Issues through Facebook
...Show More Authors

The platforms of social networking sites, with their distinctive communication and technological features, create a social movement that led to the establishment of a new pattern of communication in a modern context. This allows the users on the internet to carry out many social interactions based on the interests and commonalities among them. Algerian women have a share of this digital presence by representing their views and discussing their issues on several sites like Facebook, for example.
In this research, we have analyzed the pages of Algerian women on Facebook site to find out the most important issues addressed by Algerian women so that we can organize their concerns in the digital channels and discover their different orientations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
مجلة الآداب والعلوم الإنسانیة
الأداء الاعلامي بين الرضا الوظيفي و المهنية للمرأة الاعلامية في القنوات الفضائية العراقية
...Show More Authors

ﺔﻴﻋﺍﺫﻹﺍ ﺕﺎﻴﻨﻘﺘﻟﺍ ﻡﺍﺪﺨﺘﺳﺍ ﰲ ﲑﺒﻛ ﺭﻮﻄﺗ ﻦﻣ ﻝﺎﺼﺗﻻﺍ ﺮﺼﻋ ﻩﺪﻬﺷ ﻱﺬﻟﺍ ﺖﻗﻮﻟﺍ ﰲ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍﻭ ﺍ ﺢﺴﻓ ﰲ ﻢﻬﺳﺃ ﺕﺎﻄﶈﺍ ﺀﺍﻮﺳ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﺚﺒﻟ ﻊﺳﺍﻮﻟﺍ ﻝﺎ ( ﺔﻴﺿﺭﻷﺍ ﺔﻴﻠﺑﺎﻜﻟﺍ ﻭﺃ ﺔﻴﺋﺎﻀﻔﻟﺍ ﻭﺃ ( ﱵﻟﺍ ﺔﺻﺎﳋﺍ ﺔﻴﺋﺎﻀﻔﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﻦﻣ ﺪﻳﺪﻌﻟﺍ ﺭﻮﻬﻇ ﰲ ﺎﻀﻳﺃ ﺪﻋﺎﺳ ﺎﳑﻭ ، ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﺭﻮﻬﻇ ﻚﻟﺫ ﻞﺒﻗ ﺩﺎﺳ ﻥﺃ ﺪﻌﺑ ﺔﻴﻣﻮﻜﺣ ﲑﻏ ﺕﺎﻴﻌﲨ ﻭ

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Study the Factors Effecting on Welding Joint of Dissimilar Metals
...Show More Authors

The aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding.  The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.

        The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force.  Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Tue Aug 30 2022
Journal Name
Pakistan Journal Of Medical & Health Sciences
Association between Digital Addiction and Sleep Habits for Preschool Children
...Show More Authors

Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Wed Feb 28 2024
Journal Name
Mosul Journal Of Nursing
Association between Digital Addiction and Eating Behaviors for Preschool Children
...Show More Authors

Publication Date
Tue Feb 02 2021
Journal Name
جامعة واسط مجلة كلية التربية
استعمال الانموذج اللوجستي ثنائي المعلم في بناء وتدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة
...Show More Authors

تهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا

... Show More
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (25)
Crossref