Preferred Language
Articles
/
abaa-409
DEVOTING MEDIA PLURALISM THROUGH ACHIEVING CULTURAL DIVERSITY IN DIGITAL MEDIA: : (Features, Constituents And Obstacles )
...Show More Authors

The media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the features of cultural diversity in digital media and its roles in promoting it in light of the characteristics and transformations that have touched many aspects of human life.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The influence of Online Training Courses on Iraqi EFL Instructors Teaching and Learning Process
...Show More Authors

For over a decade, educational technology has been used sparingly in our schools and universities. Online training courses have been used since 2003 to fill the gaps in our learning system and to add extra program besides classroom learning. This paper aims to investigate the Iraqi EFL instructors’ participating in online training courses and its influence on the process of teaching and learning.

       The sample of present study consists of 30 instructors from University of Baghdad. The questionnaire of sixteen items was constructed. After ensuring validity and reliability of questionnaire, it was applied on March 2013 and the result shows that most of instructors improve their teaching methods b

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Adaptive digital technique for discriminating between shadow and water bodies in the high resolution satellite imagery
...Show More Authors

This research presents a new algorithm for classification the
shadow and water bodies for high-resolution satellite images (4-
meter) of Baghdad city, have been modulated the equations of the
color space components C1-C2-C3. Have been using the color space
component C3 (blue) for discriminating the shadow, and has been
used C1 (red) to detect the water bodies (river). The new technique
was successfully tested on many images of the Google earth and
Ikonos. Experimental results show that this algorithm effective to
detect all the types of the shadows with color, and also detects the
water bodies in another color. The benefit of this new technique to
discriminate between the shadows and water in fast Matlab pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 03 2015
Journal Name
Al-ustath
Witchcraft and Women’s Spaces; A cultural Materialism Study of John Updike’s The Witches of Eastwick
...Show More Authors

Witch stories are part of American popular culture, and this culture is extremely influenced by a continuing reliance on its past. The modern obsession of Americans with witches, whether real or metaphorical, is related to politics especially when it came to issues of gender politics. This article exposes a modern image of the female character seen from a male author point of view. John Updike, influenced by the changes that happened to women within second wave of feminism, attempted to write The Witches of Eastwick (1984). Actually, he presented women who did have a sort of careers. His witches are professional active and dynamic. What do witches stand for in American Culture? Why did Updike choose to write

... Show More
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Theatrical Visual System between the Cultural Identity and Globalization Culture Iraqi Theatre as Case Study
...Show More Authors

Crossref
Publication Date
Fri Oct 24 2014
Journal Name
Journal Of Religion And Health
Cross-Cultural Validation and Psychometric Properties of the Arabic Brief Religious Coping Scale (A-BRCS)
...Show More Authors

View Publication
Scopus (24)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
МИР НАУКИ, КУЛЬТУРЫ, ОБРАЗОВАНИЯ
SIMILARITIES AND DIFFERENCES IN THE NAME OF BREAD IN THE GLUTONIC PICTURES OF THE WORLD IN THE RUSSIAN-LANGUAGE AND ARABIC-LANGUAGE NATIONAL-CULTURAL CODES
...Show More Authors

The author’s research is dedicated to the actual problem of identifying the linguoculturological and translation features of the glutonic vocabulary both in Russian and in Arabic. It is noted that the vocabulary of the glutonic type is extremely rich and diverse, as it is part of the national and linguistic culture of the Russian and Arab people. In the gastronomic discourse of the Russian people and the Arab peoples, it is represented by various parts of speech. The study of the traditions of food consumption confirmed the rich stylistic possibilities of the glutonic vocabulary, the names of bread in Russian and Arabic languages. It has been established that in modern Russian gastronomic discourse, glutonic lexical units are involved

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Research In Pharmacy
Phytochemical constituents of ethyl acetate fraction of both roots and leaves of Sansevieria triafasciata cultivated in Iraq and assessment of its anti-proliferative effect on breast cancer cell line
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More