Preferred Language
Articles
/
jcolang-429
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called graphic novel1. Graphic novels are "book – length, high quality comic books that introduce children's and adults to a wide range of literary fiction and nonfiction subjects."2 Comic books, on the other hand, are sequential narratives that are supported by graphics and images thus combining words with images to form a narrative.3 It has a distinctive form compared to other types of literature. Usually comic books tackle light, comic themes printed on glossy magazine – like paper, sold in bookstands and are relatively short.4 While graphic novels, on the other hand, tackle more mature and dark themes, are printed on book – like papers, are sold in bookstores and they are longer. Thus, the term graphic novel was used to distinguish it from comic books.5

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (14)
Crossref (16)
Scopus Crossref
Publication Date
Mon Sep 20 2021
Journal Name
Research J. Pharm. And Tech.
The special techniques for Semen analysis and preparation
...Show More Authors

Infertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub

... Show More
Scopus
Publication Date
Sun Aug 15 2021
Journal Name
Al-qadisiyah Journal Of Pure Science Vol.(26) Issue (special Issue Num.4) (2021) Pp. 30–33
Accounts for the groups (2, ), = 41 and 43
...Show More Authors

Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Multifactor Algorithm for Test Case Selection and Ordering
...Show More Authors

Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Religious differences for customers And New Products Adopation
...Show More Authors

Abstract

The problem with the search at the reduction of adoption of new products, as there are three hypotheses of research have been formulated , the first one is no significant correlation between the religious and differences to customers and adopt new products, and This Study Aimed To Investigate The Relationship Between Religious differences for customers And New Products Adoption, Applied On Arab Mall Commercial Customers/ Egypt, an Analytical Model Is Developed As Guideline To Test The The Relationship Between Religious differences for customers And New Products Adoption, Aquantative Method With Deductive Approach Were Chosen In This Research . In Order To Collect Primary Data, A questionnaire Is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation between SMBH and SFR for Quasars
...Show More Authors

     A Spectroscopic study has been focused in this article to study one of the main types of active galaxies which are quasars, and to be more precise this research focuses on studying the correlation between the main engine of Quasi-Stellar Objects (QSO), the central black hole mass (SMBH) and other physical properties (e.g. the star formation rate (SFR)). Twelve objects have been randomly selected for “The Half Million Quasars (HMQ) Catalogue” published in 2015 and the data collected from Salon Digital Sky survey (SDSS) Dr. 16. The redshift range of these galaxies were between (0.05 – 0.17). The results show a clear linear proportionality between the SMBH and the SFR, as well as direct proportional between the luminosit

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Bit Record Analysis for Bits Evaluating and Selection
...Show More Authors

The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about  the used weight on bit  WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref