Preferred Language
Articles
/
abaa-146
Narrative and Electronic news Story: (Semiotic approach)
...Show More Authors

The e-news is one of the most important journalistic arts in new media (the Internet). The process of telling the story by the journalist is an important aspect of the communicative process between the users of the internet and the reporter. The electronic news is characterized by having text, fixed images, animations, videos and sound. All these give greater vitality to the communicative process and increase the semiotic dimensions. Also, it makes the narrative process more distinctive and embodied of the elements of the event. This research studies all these aspects and tries to show the distinction between the semiotics of narration and the electronic news.

View Publication
Publication Date
Sat Feb 04 2023
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Designing an electronic vest to evaluate movement abilities in foil fencers
...Show More Authors

Fencing sport coaches seek fencers who have high velocity and work hard to develop it through training. The research problem lies on when measuring movement abilities through some tests. Manual measurement does not give reasonable impartiality of timing because there is a time-frame between the movement of the fencer and the speed of the movement of the human time setter. Therefore, the authors sought to design an electronic vest to evaluate movement abilities in foil fencers. The study design was experimental, with 12 Iranian foil fencers of the national team, who were divided into two equal groups of 6 fencers. Moreover, there were 12 students from Physical Education and Sport Sciences that worked on the scientific f

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The American Pharmacists Association
Estimating the cost of unclaimed electronic prescriptions at an independent pharmacy
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving customer satisfaction by booking electronic flight tickets via the Internet of Things technology
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Die Dimensionen der Kurzgeschichte”Steh auf, steh doch auf“ The Dimension of short story (wake, Wake) 1958 by the German writer, Heinrich Böll.
...Show More Authors

In dieser Kurzgeschichte werden die Züge der Trümmerliteratur präzis dargestellt. Die wurde von Heinrich Böll im Jahr 1958 geschrieben. In der vorliegenden Arbeit konzentriere ich mich auf vielfältige Stoffe in Bezug auf die Lage nach dem Zweiten Weltkrieg. So gab ich dieser Arbeit einen besonderen Titel, der die Dimensionen dieser Kurzgeschichte heißt. Ich meine hier, die profunde Interpretation dieses Werkes, denn ich fand zwar hinter einigen Wörtern eine ganze Geschichte, die uns der Erzähler dadurch zeigen wollte.

So teilte ich diese Wörter (Grab, Schatten, Last, Schrei) als Dimensionen, von denen diese Arbeit umgekreist wird.

Diese Arbeit besteht aus vier Kapiteln, die aufeinander aufgebaut sind. Im ersten K

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 17 2025
Journal Name
Al–bahith Al–a'alami
Topics of Women in the Iraqi Newspaper (Al- Sabah): (Feminist Approach)
...Show More Authors

 

The search tried to achieve a major scientific goal represented by (Knowing the perspective that has been treated through press releases of woman articles in Al- Sabah newspaper), via:

  1. Specifying the rate of woman topics in Al-Sabah newspaper, compared with the other subjects.
  2. Revealing the nature of the topics of the woman that the newspaper dealt with.
  3. Identifying the ID of journalistic-product that dealt with the woman topics.
  4. Knowing the journalistic arts that the woman topics have been treated by.
  5. Standing on the cases which woman topics concentrated on, through Al-Sabah newspaper.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref