Preferred Language
Articles
/
iBZQJIwBVTCNdQwCHPhL
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract features vectors from user faces. Moreover, the relevance of the suggested generating key is led to a crucial role in security improvement by producing them as difficult to intruders. According to PSNR values, the recommended encryption algorithms provided an adequate outcome in the encryption, they had a lower encrypting duration and a larger encrypting impact.

Scopus Crossref
View Publication
Publication Date
Tue Mar 01 2022
Journal Name
Bulletin Of The Australian Mathematical Society
A DYNAMICAL STUDY OF SALINE PLUMES IN DESALINATION OUTFALLS
...Show More Authors

View Publication
Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Cavitation microbubbles in the medical ultrasound imaging: A Review
...Show More Authors

Ultrasound is a mechanical energy which can generate altering zones of compression and rarefaction along its path in the tissues. Ultrasound imaging can provide a real time screening for blood and multiple organs to aiding the diagnostic and treatment. However, ultrasound has the potential to deposit energy in the blood and tissues causing bio effects which is depending on ultrasound characteristics that including frequency and the amount of intensity. These bio effects include either a stable cavitation presented non thermal effects or inertial cavitation of harmful effect on the tissues. The non-thermal cavitation can add features in diagnostic imaging and treatment more than the inertial cavitation. Ultrasound Contrast agents are a micro

... Show More
Publication Date
Fri Feb 02 2024
Journal Name
Kurdish Studies
A Linguistic Study of Metaphorical Expressions in Political Interviews
...Show More Authors

In recent years, the linguo-philosophical studies of metaphor have tended to define metaphor as an interaction of the object, that is the referent of conceptualization and some features that are associated with sensual manner realities, whose name is used when resolving the conceptual problem-nominative situation, namely the situation of the formation of a new concept and its verbalization. The objective of this term paper lies in the phenomenon of metaphors used in modern political discourse. In our understanding a metaphor is not only of a linguistic nature, but also political. This paper approaches the subject of conceptual metaphor and political argumentation through the prism of synergies of the political topic, affirmative or negative

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
مجلة الأستاذ للعلوم الإنسانية والاجتماعية
Impoliteness in Some American Presidential Debates: A Pragmatic Study
...Show More Authors

The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason

... Show More
Preview PDF
Publication Date
Wed May 04 2016
Journal Name
Journal Of New Theory
INTERSECTİONAL (α,A )-SOFT NEW-İDEALS İN PU-ALGEBRAS
...Show More Authors

Publication Date
Thu Sep 10 2020
Journal Name
Journal Of Advances In Mathematics
A Study of The Density Property in Module Theory
...Show More Authors

In this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.

Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
A RAISIN IN THE SUN: the dream of RECOGNITION
...Show More Authors

Lorraine Hansberry’s A Raisin in the Sun (1959) appeared at the beginning of renewed political activity on the part of the blacks; it is a pamphlet about the dream of recognition of black people and the confusion of purposes and means to reach such recognition. It embodies ideas that have been uncommon on the Broadway stage in any period. Situations such as a black family moving into an all-white neighborhood were not familiar before this time; they were just beginning to emerge. In depicting this so realistically, Hansberry depends more on her personal experience as an African American embittered by social prejudices and discrimination. 

View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Sound Assimilation in English and Arabic: a Contrastive Study
...Show More Authors

      This piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.

     The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref