Preferred Language
Articles
/
jBfnNY8BVTCNdQwCA2Kf
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

Crossref
View Publication
Publication Date
Thu Aug 01 2024
Journal Name
Materials Science In Semiconductor Processing
Enhancing charge transfer in 0D/2D cobalt sulfide/boron-doped graphitic carbon nitride heterojunction photocatalyst for degradation of organic pollutants under LED illumination
...Show More Authors

Semiconductor-based photocatalytic processes are widely applied as ecofriendly technology for degrading organic pollutants. Establishing photocatalytic heterojunctions with Z-type photocarriers transfer pathways is projected to be a superb strategy to enhance photocatalytic behavior. In this paper, novel and stable (0D/2D) heterojunctions of CoS-embedded boron-doped g-C3N4 (CoS/BCN) with a high rate of charges transfer/separation were assembled for degradation of malachite green dye (MG). The CoS/BCN photocatalyst achieves a photodegradation efficiency of 96.9 % within 1 h of LED illumination, which is 2.5 and 1.4-fold enhancement compared with bare g-C3N4 and BCN, respectively. Besides, the results of species-trapping trials exhibited that

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 02 2016
Journal Name
European Academic Research
‘Resymbolization’ of a Text; a Relatively Different Perspective of Graham Greene’s The Quiet American
...Show More Authors

The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend

... Show More
Publication Date
Mon Dec 26 2022
Journal Name
Journal Of The College Of Basic Education
The directorial vision of the theatrical text In the concept of a picture theater
...Show More Authors

أثر تنوع الرؤى الاخراجية للاتجاهات والحركات المسرحية المعاصرة في أتساعالاشتراطات الجمالية لبنية الخطاب المسرحي + الامر الذي ادى الى انزياح مكوناتالعرض وعناصره ؛ ومنها المنظومة السردية للنص التي شكلت في بدايات المسرحجغرافية العرض المسرحي والمرتكز النظري والفكري الذي يمد العرض المسرحي أغلبتدفقه الجمالي وعنصر أستعلائي لعناصر العرض الاخرى ؛ وضمن التطورات اللاحقةأنسحب المخرج المسرحي من سطوة البنية النص

... Show More
View Publication
Publication Date
Wed Jun 27 2018
Journal Name
Journal Of The College Of Education For Women
The Referential Aspect of the Quranic Text Az-Zahraa’s)Peace Be Upon Her( Speech
...Show More Authors

In the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.

View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Erotic and its epistemic connotations in the Iraqi theatrical text: علي كريم حسون الركابي
...Show More Authors

  eroticism formed a basic focus in contemporary studies and caused a problematic clash in terms of terminology, as some interpreted it by pornography and another interpreted it as aesthetic, so this research came to seek to decipher this terminological clash, and to be known as erotech in terms of cognitive significance, Accordingly, the research culminated in four chapters. The first chapter (Methodological Framework) talks about the research problem that came according to the following question: “How is the erotic act built in the theatrical text and what are the epistemic connotations that express its subjectivity? Then followed by the importance of research and the need for it, then the objective of the research, and the boun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Ieee Transactions On Cognitive Communications And Networking
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref