Preferred Language
Articles
/
abaa-72
The Interactive Relationship between the Formation Elements and their Implications in the Structure of the Television Image
...Show More Authors

The image of television dominates the cognitive and artistic motivations. It is the formulation of ideas and visions along with its documentary ability. It is the main element in television work as it is a story that is narrated in pictures. Therefore, attention to image building is a major point of gravity in the work structure as a whole. On the image is the element carrying all aesthetic and expressive values of news and information directly to the hints that work to stimulate and stir the imagination of the recipient to evoke mental images added to the visual images to deepen the meanings.
All visual arts carry elements and components that follow in a particular pattern to give special meanings and specific connotations. However, a person is more responsive to the images resulting from a certain consistency of the surface, shape, and blocks of objects because this harmony creates a sense of pleasure while the lack of such harmony causes with discomfort and indifference or even dissatisfaction and dislike as Herbert Reid put it. Therefore, the harmony in the arrangement and organization of the elements of television image leads to the creation of the state of engagement and autism with them and thus accept television work as a unit. From these facts, this research, which deals with the plastic structure of television image, is launched in an analytical study of the television work (bioot alsafeeh)

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamic Channel Assignment Using Neural Networks
...Show More Authors

This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 17 2015
Journal Name
Iraq Agriculture Journal.
Abelmoschus esculentus استخلاص وتنقية بروتييز قرنات البامية المحلية
...Show More Authors

This study aimed to extract, purify, and characterize the protease of local Okra Abelmoschus esculentus pods. The extraction process was conducted using ten extraction solutions with different pH and ionic strength values. Phosphate buffer solution with (pH 7, 0.05M, containing 2% sodium chloride) gave the highest activity which was (7.2 Unit/ml) as compared to other solutions, which ranged from 0.8-5.9 Unit/ml. The extracted enzyme purified by several stages. Being, precipitation by gradual addition of Ammonium sulphate from 20 to 85% saturation, then the precipitated enzyme was dialyzed and fractionated through DEAE-Cellulose (22X1.1cm), the enzymic fractions were pooled. The specific activity, purification fold and the enzyme yield value

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Fri May 30 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF