The majority of Iraqi translator-student have problems at two main levels: the conceptual level and the productive level. From different perspectives, such problems are either related to ‘language’ or to ‘cognition’. This binary view is an indication to the implicit and interchangeable relationship between language and cognition. The relationship between cognition language and translator starts with the first language and its effect on the Iraqi translators. Identifying the effect is the aim of the present study. It is hypothesized that Iraqi students are negatively influenced by the problems and weaknesses of first language schema. This reflects the major claim and later concludes that first language instruction in the Iraq
... Show MoreThis study examines the species composition, biodiversity, zoogeography, and ecology of freshwater gastropods of 12 springs in Andijan region of Uzbekistan. The study used generally accepted malacological, faunistic, ecological, analytical, and statistical methods. As a result of research in the springs, 14 species of freshwater gastropods belonging to 2 subclasses, 5 families, and 10 genera were recorded. 7 of them are endemic to Central Asia. When indicators of biodiversity of mollusks were analyzed according to the Shannon index, it was found that the highest value was recorded in the springs besides the hills. According to the biotope of distribution and bioecological features, they were divided into cryophilic, phytophilic, pelophil
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential