APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
APDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021
People’s ability to quickly convey their thoughts, or opinions, on various services or items has improved as Web 2.0 has evolved. This is to look at the public perceptions expressed in the reviews. Aspect-based sentiment analysis (ABSA) deemed to receive a set of texts (e.g., product reviews or online reviews) and identify the opinion-target (aspect) within each review. Contemporary aspect-based sentiment analysis systems, like the aspect categorization, rely predominantly on lexicon-based, or manually labelled seeds that is being incorporated into the topic models. And using either handcrafted rules or pre-labelled clues for performing implicit aspect detection. These constraints are restricted to a particular domain or language which is
... Show MoreThe question of word–formation motivation is one of the most urgent problems of morphological features of diminutive vocabulary in the languages of different structures, Arabic – Semitic and Russian - Slavic. The relevance of this question lies in the fact that the analysis of morphological elements of word-formation motivation plays an important role not only in identifying formal and semantic connections between different units of the same language, but also has an applied value in the comparative study of different languages. Taking in to account that word-formation motivation is usually considered sequentially in order to identify motivational relationships of this type of vocabulary, we will study motivation in comparative analy
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreSongs are considered as an educational and a substantial dependable references used in teaching and learning, particularly the so - called foreign language learning that allows learners to adapt to the target language culture and to develop their language learning skills including: listening comprehension, reading comprehension, speaking and writing. Consequently, it can be said that the Francophone songs with the musical richness and resonance specifically facilities French language learning skills for all levels of education and achieve short and long terms predetermined educational language learning goals.
In fact, language learning through songs method does not only include the
... Show MoreThis article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.
This research is considered a simple attempt and effort which is it first and last target is to point at the procedures of the taxes account that aims to reduce the taxes from the persons and give free to the person who estimates the tax to practice what comes from the competent authorities to describe the person who estimates the tax and not an accountant who practice the accountant procedures which are imposed on him by the annual terms from higher administrations , So he can not evaluate state of the person who pay the tax , and he might be dissatisfied with his job , because his role can’t be activated from the general foundation taxes.
And so , this research includes four fields:-
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More