Preferred Language
Articles
/
rhdMPo4BVTCNdQwCMj4D
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Tue Apr 30 2019
Journal Name
International Journal Of Environmental Research
A Comparative Study for the Identification of Superior Biomass Facilitating Biosorption of Copper and Lead Ions: A Single Alga or a Mixture of Algae
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Historical Value of Dickens’s A Tale of Two Cities
...Show More Authors

In "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction Pp 545-555
Numerical Analysis of Historical Masonry Minaret Subjected to Wind Load
...Show More Authors

Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Chinese power challenge of becoming historical sites in the course
...Show More Authors

China occupies an area of 906 million square km. and lies east Asia. Its population approximately 1,388 people, according to census 2010. China was a global great power for centuries , then shrank its jurisdiction and occupied by European countries and Japan in the 19th century. It regained its strength and independence under the leadership and rule of the Chinese Communist Party since 1949. In the 21st century , the Chinese positions has risen universally due to its achievements in the economic and trade affairs . Nowadays, China became a largest exporting state in the world and a second economic power after USA.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 09 2024
Journal Name
مجلة واسط للعلوم الریاضیة
The development of judo from a historical perspective (1880-1980)
...Show More Authors

Judo has witnessed tremendous developments since its inception until the present day. It has been distinguished by its adaptation to the various challenges it has faced throughout the ages. Judo is one of the sports that have been affected by social, technological and cultural changes. These changes reflect its transformation from the traditional Japanese martial art to a global sport practiced. All over the world, therefore, studying the historical development of judo is important, as it provides valuable insights into the development of martial arts over a century, by studying the origins, principles and techniques of judo for the period (1880 - 1980), and also enables us to gain an understanding A deeper understanding of how the art form

... Show More
View Publication
Publication Date
Mon Jun 30 2025
Journal Name
Ingénierie Des Systèmes D Information
Comparative Analysis of Four Programming Languages for Machine Learning
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Affect of learning the bag in the acquisition of historical concepts for students in the fifth grade literary history
...Show More Authors

The  adopted method in the teaching of history is conservation and indoctrination in all grades, and this will lead to a lack of students interact with teachers in the course of the lesson, and poor use of teachers to questions that raise students' thinking during the lesson, which leads to a lack of interest in the topic of the lesson and wasting opportunities contribution making it the teacher at the center of the educational process, and to provide arrogating the researcher to contribute to teaching style with the belief that the use of this method of teaching could lead to overcome the difficulties and problems faced by the teaching material.

And there are educational complexes integrated approac

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 12 2025
Journal Name
The Alarba'een Journal
Analyzing and tracking the data of the millions sized gatherings for the Arba'in visit and proposing alternative ways to relieve congestion using spatial analysis algorithms
...Show More Authors

The city of Karbala is one of the most important holy places for visitors and pilgrims from the Islamic faith, especially through the Arabian visit, when crowds of millions gather to commemorate the martyrdom of Imam Hussein. Offering services and medical treatments during this time is very important, especially when the crowds head to their destination (the holy shrine of Imam Hussein (a.s)). In recent years, the Arba'in visit has witnessed an obvious growth in the number of participants. The biggest challenge is the health risks, and the preventive measures for both organizers and visitors. Researchers identified various challenges and factors to facilitating the Arba'in visit. The purpose of this research is to deal with the religious an

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Dec 28 2025
Journal Name
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni

... Show More
View Publication
Crossref