Preferred Language
Articles
/
dRbhqYcBVTCNdQwCt1pp
https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=vMRWa_AAAAAJ&citation_for_view=vMRWa_AAAAAJ:QIV2ME_5wuYC#:~:text=Imaginative%20thinking%20among%20secondary%20school%20students%20in%20mathematics
...Show More Authors

The research aims at identifying the level of imaginative thinking skills in mathematics among fourth scientific grade students.For this purpose, the researcher adopted the descriptive (survey) approach, as an imaginative thinking test was built and applied to the research sample that consists of (301) students from fourth scientific grade students who are distributed to secondary and Preparatory schools,they are Al-Furat Preparatory, Al-Hindiya Preparatory school and Al-Rajiba Preparatory school , who are affiliated to the Al-Hindiya Education Department of the General Directorate in the Holy Karbala Governorate for the academic year (2021-2022). The imaginative thinking test consisted of (36) items of four alternatives multiple-choice objective test, where its validity and reliability were verified and it was acceptable. The test was applied in the final form, the researchers used the statistical package (SPSS), and the results showed that the research sample possessed imaginative thinking skills.

Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use of lower squares and restricted boxes In the estimation of the first-order self-regression parameter AR (1) (simulation study)
...Show More Authors

Use of lower squares and restricted boxes
In the estimation of the first-order self-regression parameter
AR (1) (simulation study)

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Phonological and Suggestive Rhythm in the Context of the Quranic Text: The Phonological and Suggestive Rhythm in the Context of the Quranic Text
...Show More Authors

Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from

poetry and prose. It is a unique texture in its rheto

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (300)
Crossref (271)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology
...Show More Authors

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF