Preferred Language
Articles
/
jcofarts-316
The Suggestive Semantic of Paratexte in printed screenplay
...Show More Authors

Recent studies have tended to look at Mottagorat texts for seeking more of the information provided by the book for the reader, has been known by several terms Mottagorat texts, including thresholds, including the margins of the text and the parallel texts, and came this difference, according to researchers who ate the subject of research and investigation. Thus, the researchers assert that all these texts must be subjected to provide information even if propaganda of the text. Hence arose the importance of these texts in Informatics scientific material being wrapped body of the text as well as being propaganda material to evoke the recipient to read, and then to the importance of this topic, the search came on five chapters, the first chapter dealt with the researcher and the research problem, which was: What are the signs suggestive texts involved in parallel to the original text, a screenplay? The goal of the present study is to detect signs suggestive texts carried by parallel scenario surrounding the film. Chapter II also included a theoretical framework has been divided on the two themes: First, the parallel nature of the text. And second, sections and types of parallel texts. The third quarter was the search procedures, as was the research methodology is descriptive analytical method, and was the research sample is a scenario that did not (the trial). The fourth chapter is an analysis of the research sample also came fifth chapter of the findings and conclusions, the most important were:fundamental value to create meaning in the title is the font size, color, and location of the space of the interface cover, as it was the title of the research sample demonstrates the substance of the conflict through its sheer size, which, if anything, it shows the magnitude of the disaster suffered by the hero, as well as the font color was red which demonstrates the crime, murder, and others, such as the rise of so authoritarian regime will inevitably be at the expense of the fates of people and blood

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Materials Today: Proceedings
Preparation, characterization and preliminary cytotoxic evaluation of 6-mercaptopurine-coated biotinylated carbon dots nanoparticles as a drug delivery system
...Show More Authors

View Publication
Scopus (19)
Crossref (12)
Scopus Crossref
Publication Date
Tue Dec 07 2021
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Iraqi Journal Of Science
Estimate Antimicrobial activity and Anti-biofilm formation of bark Cinnamomum zeylanicum on Klebsiella pneumoniae isolated from Urinary Tract Infections
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activates Studies of some New Derivatives From 2-aminoo-5-mercapto-1, 3, 4-thiadiazole
...Show More Authors

In this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 23 2016
Journal Name
Oriental Journal Of Chemistry
Synthesis and Antioxidant Ability of Some 4-(((4-(5-(Aryl)-1,3,4-Oxadiazol-2-Yl)Benzyl)Oxy)Methyl)-2,6-Dimethoxyphenol
...Show More Authors

A series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio

... Show More
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 19 2022
Journal Name
Journal Of Solid State Electrochemistry
Thermal, electrical and electrochemical properties of ionic liquid-doped poly(ethylene oxide)–LiTDI polymer electrolytes for Li-ion batteries
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Anti-cancer and Antioxidant Activities of Some New Synthesized Mannich Bases Containing an Imidazo (2, 1-B) Thiazole Moiety
...Show More Authors

       Synthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.

FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Numerical and Analytical Solutions of Space-Time Fractional Partial Differential Equations by Using a New Double Integral Transform Method
...Show More Authors

  This work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.

View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes
...Show More Authors

The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref