Preferred Language
Articles
/
sBcft40BVTCNdQwCFRlu
Actor performance features in the types of theatrical silent
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
The Effect of Special Exercises for those with (Cognitive Concentration) in the Development of Motor Satisfaction and Learning Some Types of Scoring Basketball for Students
...Show More Authors

The importance of the research in the preparation of special exercises to develop some types of basketball scoring as a contribution to help the physical education teacher to find successful educational alternatives. The purpose of the study was to prepare special exercises for the cognitive (cognitive) survey in the development of motor satisfaction and learning some types of Scoring for basketball for students. Learn about the effect of cognitive exercises in cognitive development in students. The survey included students from the first stage of the Faculty of Physical Education and Sports Science \ University of Diyala (159) divided into 6 people. The sample was randomized by (b) and (b) D) and after dispersion by the standard method In

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Hybrid Method of Linguistic and Statistical Features for Arabic Sentiment Analysis
...Show More Authors

          Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and some Features of Three-Phases Polymer/Metal/Ceramic Multilayers Nanocomposite
...Show More Authors

      Layer by layer development two features of pulsed laser deposition PLD, with a high kinetic energy and sharp instantaneous deposition rating. Layered films of polymer/metal/ceramic nanocomposites consisting of polystyrene PS(as substrate) , tin Sn and cadmium oxide CdO were deposited by PLD. Structure for layered samples were measured  by XRD X ray diffraction, there were appearance of peaks  which reflected  to formation of new compounds result of  reaction between layers. Particles size  was calculated using two methods and it give nanoscale. Microstrain was also calculated  and exhibited  high value (0.01) for sample p/m.

 

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
The Reality of Evaluating Teacher Performance in the Sultanate of Oman in Light of Global Models
...Show More Authors

The aim of the research is to reveal the reality of teacher performance evaluation in the Sultanate of Oman in light of some global models. The study followed a qualitative descriptive research design. Seven forms of teacher formative and summative assessments were analyzed. Besides, an analytical template was developed, consisting of six areas related to the teaching performance of teachers. These included: lesson planning and preparation, learning environment, education, professional development, student academic, and community and parental partnership. The study reached a number of results; the most notable is the lack of change of forms for more than a decade despite the rapid development of the educational system in the sultanate in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
مجلة نسق
Evaluating the Students’ Performance in the College of Education for Women in Using the Digital Transformation
...Show More Authors

This study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio

... Show More
View Publication
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial and administrative corruption: concept, causes, types and ways to address them in Iraq
...Show More Authors

Abstract:-

The phenomenon of financial and administrative corruption is not the result today, but not tied to time or designated place, he is the scourge is rampant in all countries of the world, without exception, those developed and developing, a phenomenon that crossed national boundaries and become withstand a global character, and corruption is limited to communities of particular economic systems without the other, but suffered Throughout history most societies to varying degrees, Iraq is one of the countries that suffered and continues to suffer from corruption, which has become, B grumble in most of the Iraqi state institutions, especially after the occupation in 2003 as administrative corruption in Iraq arrived i

... Show More
View Publication Preview PDF
Crossref