The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibiting it, due to the fact that they could not evade the power of technological progression. In that matter, future perspectives would be employing data mining techniques to explore deep knowledge, which represents correlated relationship between the human and the mobile phone.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreAbstract:
Borago officinalis is highly interesting amongst nutritional and medical source relate to its high composition of some useful phytochemical compound. It is great plants with bright blue star-shaped flowers present in most world regions and usually known as borage. The Borago phytochemical analysis showed the presence of alkaloids, tannins, flavonoids, phenolic acids, essential oil, vitamins and others. Borage is cultivated all over the world and used in traditional medicine as a demulcent, diuretic, emollient, tonic, expectorant, for the treatment of coughs, inflammation and swelling, and other diseases. In herbal medicine, Borage seed oil (BSO) has been utilized for many progressive illnesse
... Show MoreGum Arabic is a natural gummy exudate gained from the trees of Acacia species (Acacia senegal and Acacia seyal), Family: Fabaceae. Gum Arabic considers as a dietary fiber with a high percentage of carbohydrates and low protein content. Sugars arabinose and ribose were originally discovered and isolated from gum Arabic and it is representing the original source of these sugars. A gum emanation from trees occurs under stress conditions such as heat, poor soil fertility, drought, and injury. Mainly gum is produced in belt region of Africa, mainly Sudan, Chad, and Nigeria. In the food industry, it is used in confectionery; in the pharmaceutical industry, it is used as emulsifier, film coating and others. Traditionally the g
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThe Phenomenon of Euphemism in the Translon Activity Euphemism is the replacement of a harsh word with a less harsh or more acceptable one. Most languages are affected by ideological, cultural, social, or religious perspectives which in turn would reflect different linguistic levels. On such a basis, translation is affected by its medium,i.e. language, and consequently what is acceptably expressed by a nation may not be acceptable by another. In this paper, we try to
... Show MoreAbstract Drug addiction is considered a criminal behavior, which led the Iraqi legislator to prohibit and criminalize it, imposing penalties on those who use or even approach it. This aims to limit its presence in Iraq and reduce unethical behaviors, leveraging the divine prohibition to curb it. The legislator also encourages media organizations to raise awareness about the dangers of this substance, which has contributed to reducing the phenomenon of drugs in Iraq.
the contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa