The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding of image captioning strategies and to survey previous research related to image captioning while examining the most popular databases in different languages, mostly English, translating into other languages using the latest models for describing images, summarizing evaluation measures, and comparing them.
We have studied in this research litter (Taa) a morphological , sonic indicative and comparative study among four Semitic languages. They are Arabic , Hebrew, Syriac and Akkadian languages . We have divided the research into a number of pivots beginning with an entrance about the letter (Taa) in Semitic languages and the symbols which are used by these languages referring to . Then we have studied (Taa) from sonic side with letters phenomenon (b, g, k, p, t) the six in both Hebrew and Syriac languages . The letter (Taa) is formed one of them and the sonic change that is happening in articulation (Taa) according to sonic rules related to these letters in case of emphasis or in case of neglected (not emphasis). Then we have studied the pro
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Vol. 6, Issue 1 (2025)
THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
This paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data. It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t
... Show MoreThe present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreAbstract
The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.
To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions: physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items
... Show More