Preferred Language
Articles
/
jcoeduw-549
THE PORTRAIT OF THE ARTIST AS A ROBOT: A LITERARY LOOK AT E-POETRY
...Show More Authors

This study examines the validity of e-poetry as an acceptable literary genre. The
thematic, stylistic and esthetic features of a selected number of e-poems produced by
poetry generators are analyzed for this purpose. The e-poems are then compared with a
number of works written by Dada poets in order to establish the literary merit of the
former.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (14)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue May 08 2018
Journal Name
Journal Of Dental Research
Self-Limiting versus Conventional Caries Removal: A Randomized Clinical Trial
...Show More Authors

A single-blind randomized controlled clinical trial in patients with deep caries and symptoms of reversible pulpitis compared outcomes from a self-limiting excavation protocol using chemomechanical Carisolv gel/operating microscope (self-limiting) versus selective removal to leathery dentin using rotary burs (control). This was followed by pulp protection with mineral trioxide aggregate (MTA) and restoration with glass ionomer cement and resin composite, all in a single visit. The pulp sensibility and periapical health of teeth were assessed after 12 mo, in addition to the differences in bacterial tissue concentration postexcavation. Apical radiolucencies were assessed using cone beam computed tomography/periapical radiographs (CBC

... Show More
View Publication
Scopus (39)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Fri Sep 29 2017
Journal Name
Journal Of Nursing Scholarship
A Multicountry Perspective on Cultural Competence Among Baccalaureate Nursing Students
...Show More Authors
Abstract<sec><title>Purpose

To assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.

Design

A descriptive, cross‐sectional design.

Methods

A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.

Results

The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ

... Show More
View Publication
Scopus (41)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Aluminium Matrix Composites Fabricated by Friction Stir Processing A Review
...Show More Authors

      Aluminum alloys widely use in production of the automobile and the aerospace because
they have low density, attractive mechanical properties with respect to their weight, better
corrosion and wear resistance, low thermal coefficient of expansion comparison with traditional
metals and alloys. Recently, researchers have shifted from single material to composite materials
to reduce weight and cost, improve quality, and high performance in structural materials.
Friction stir processing (FSP) has been successfully researched for manufacturing of metal
matrix composites (MMCs) and functional graded materials (FGMs), find out new possibilities
to chemically change the surfaces. It is shown th

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETERMINATION OF SOME TRACE ELEMENTS IN HUMAN HAIR AS ENVIRONMENTAL POLLUTION INDICATOR.: DETERMINATION OF SOME TRACE ELEMENTS IN HUMAN HAIR AS ENVIRONMENTAL POLLUTION INDICATOR.
...Show More Authors

Trace Elements (Cd, Pb, Cu, Zn, Ni) level were examined in hair of donors from industrial areas, cities and village, and in permanent contact with a polluted workplace environment in lattakia. Hair sample were analyzed for their contents of the trace elements by inductivity coupled plasma- mass spectrometer (ICP- MS). It was found that the contents of (Cd, Pb, Cu, Zn, Ni) in the hair were significantly higher in the industrial areas and cities, while in the village had the lower concentration of elements. Correlation coefficients between the levels of the elements in hair found in this study showed that hair is a good indicator of Environmental Pollution.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Procedia Economics And Finance
The Mediating Role of Knowledge Sharing on Relationship between IT Capability and IT Support as Predictors of Innovation Performance: An Empirical Study on Mobile Companies in Iraq
...Show More Authors

View Publication Preview PDF
Crossref (18)
Clarivate Crossref
Publication Date
Tue Mar 10 2026
Journal Name
Journal Of Physical Education
A Safe Environment Scale from Professional Basketball Players and Coaches’ Point Of View
...Show More Authors

The aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Inverse Kinematics Analysis and Simulation of a 5 DOF Robotic Arm using MATLAB
...Show More Authors

Kinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this

... Show More
View Publication Preview PDF