The increasing complexity of how humans interact with and process information has demonstrated significant advancements in Natural Language Processing (NLP), transitioning from task-specific architectures to generalized frameworks applicable across multiple tasks. Despite their success, challenges persist in specialized domains such as translation, where instruction tuning may prioritize fluency over accuracy. Against this backdrop, the present study conducts a comparative evaluation of ChatGPT-Plus and DeepSeek (R1) on a high-fidelity bilingual retrieval-and-translation task. A single standardize prompt directs each model to access the Arabic-language news section of the College of Medicine, University of Baghdad, retrieve the three most r
... Show More-
The subject of this research is the study of the formal alienation of contemporary English sculpture, by comparing the most important sculptors of the new contemporary generation. This research problem is to look for the important factors in the formation of the contemporary sculptural structure of the exotic, and what is the mechanism of formation and output of these forms. The research seeks to explore (Alienation in contemporary sculpture between the works of Anthony Caro and Tony Cragg) in a comparative study. The importance of the research is to identify the concept of alien forms in contemporary British sculpture, especially in the cases of Anthony Caro and Tony Cragg that this research is considered a know
Mental disorders (MDs) are a common problem in Primary Health Care Centers (PHCCs). Many people with serious MDs are challenged by symptoms and disabilities that result from the disease and by stereotypes and prejudice due to misconceptions about mental illness. This study aims at evaluating the knowledge, and attitude toward mental health concepts and services and causes of the reluctance to seek those services among people attending PHCCs. A descriptive cross-sectional study was conducted. The random sampling technique was used to include (10) of Directorates of Health (DoHs) coverage north, middle, and south of Iraq. The study was executed in (50) selected PHCs, (5) PHCCs in each DoH involved randomly selected (30) people attending th
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show Moreالخلفية: التهاب المفاصل الرَثَيَانِي أو الداء الرثياني أو الالتهاب المفصلي الروماتويدي هو مرض مزمن، من الأمراض الانضدادية التي تؤدي بالجهاز المناعي لمهاجمة المفاصل، مسببة التهابات وتدميرًا لها. ومن الممكن أيضًا أن يدمر جهاز المناعة أعضاء أخرى في الجسم مثل الرئتين والجلد. وفي بعض الحالات، يسبب المرض الإعاقة، مؤدية إلى فقدان القدرة على الحركة والإنتاجية. ويتم تشخيص المرض بواسطة تحاليل دم مخبرية مثل تحلي
... Show MoreThis research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show More