Preferred Language
Articles
/
abaa-153
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
An Analysis of the Efficacy of Platelet-Rich Plasma Injections on the Treatment of Internal Derangement of a temporomandibular Joint
...Show More Authors

Background: A Temporomandibular joint (TMJ) internal derangement (TMJID) is a disruption within the internal aspects of the TMJ in which the disc is displaced from its normal functional relationship with the mandibular condyle, after which the articular portion of the temporal bone causes joint dysfunction, joint sound, malocclusion, and locking of the mouth. Conservative and invasive techniques can be used for the treatment of TMJID. A platelet-rich plasma (PRP) injection is a simple, less invasive surgical procedure for the treatment of internal derangement. The objective of this study was to evaluate the efficacy of PRP injections in decreasing or eliminating pain, clicking, and limitation of mouth opening in patients with TMJID after th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Philosophy of Beauty and Aesthetic Tasting in the Story of Yusuf, peace be upon him, with the Al-Azeez’s Wife in light of the sayings of Ancient Philosophers and Modernists: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed to review the aesthetic miracle in the story of Yusuf, peace be upon him, with the Al-Azeez’s wife, using the historical, descriptive and analytical approaches. The study sample was determined in the verses (30-34) of the Holy Quran. The study found that the beauty of Yusuf, peace be upon him, went beyond the four stages and steps of the aesthetic judgment that Feldman set, in which Yusuf’s beauty is nothing but a divine miracle that cannot be described, analyzed, and interpreted. Also despite the various concepts of beauty dealt with by ancient Greek philosophers such as the Pythagoreans, Socrates, Plato and Aristotle; and modern philosophers such as Descartes, Diderot, Kant, Hegel, and Schopenhauer are embodied in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent of auditors' commitment to the quality control system according to the Iraqi Audit guide / 7 : A field study of a sample of auditors of the second district audit office In the The Federal Financial Supervision Board
...Show More Authors

The research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of Hate Speech
...Show More Authors

Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature)  targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref