Novel Approach for Fabricating Transparent and Conducting SWCNTs/ITO Thin Films for Optoelectronic Applications
...Show More Authors
The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreBackground: Accurate measurement of a patient’s height and weight is an essential part of diagnosis and therapy, but there is some controversy as to how to calculate the height and weight of patients with disabilities. Objective: This study aims to use anthropometric measurements (arm span, length of leg, chest circumference, and waist circumference) to find a model (alternatives) that can allow the calculation of the height and the body weight of patients with disabilities. Additionally, a model for the prediction of weight and height measurements of patients with disabilities was established. Method: Four hander patients aged 20-80 years were enrolled in this study and divided into two groups, 210 (52.5%) male and 190 (47.5%) fe
... Show MoreResearch objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
The research plan: The research was divided into three topics and a conclusion.
As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re
In this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will p
... Show MoreSince the emergence of the science of international relations as an independent academic scientific field, various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories, which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination
... Show MorePraise be to God alone, and after:
This is a research entitled: “A fundamental study of judicial jurisprudence rules and their applications in the Hanbali school of thought,” in which the researcher studied eight legal jurisprudential rules considered by the Hanbalis and others.
At the conclusion of his research, the researcher reached a number of results, including: the importance of taking care of judicial rules, and the need for judges and their assistants to them, including: the need for students of science in Hanbali jurisprudence to study these rules according to the doctrine, and to highlight their applications to them, including: the importance of the rules under study, and their impact on rulings Jurisprudenc
... Show More