In this study, we tackle the understudied area of Artificial Intelligence (AI) and its role in examining how modern revolutions may affect political systems across the Middle Eastern region. despite hundreds of studies documenting Middle Eastern uprisings over the past three decades, there has been little effort to harness AI to better understand or predict these multifaceted events. This study seeks to address this gap by assessing the performance of AI-intelligence in analyzing (broadly) revolutionary processes and their effects on regional political systems. The research uses a mixedmethod methodology that involves a systematic literature review of contemporary scholarly articles, and an analytics study using AI tools. Our results show t
... Show MoreThe advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the va
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More2929-2933
Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreInfection with cryptosporidiosis endangers the lives of many people with immunodeficiency, especially HIV patients. Nitazoxanide is one of the main therapeutic drugs used to treat cryptosporidiosis. However, it is poorly soluble in water, which restricts its usefulness and efficacy in immunocompromised patients. Surfactants have an amphiphilic character which indicates their ability to improve the water solubility of the hydrophobic drugs. Our research concerns the synthesis of new cationic Gemini surfactants that have the ability to improve the solubility of the drug Nanazoxide. So, we synthesized cationic Gemini surfactants. N1,N1,N3,N3-tetramethyl-N1,N3-bis(2-octadecanamidoethyl)propane-1,3-diaminium bromide (CGSPS18) and 2,2‘-(etha
... Show MoreAdult of dipterous flies were collected monthly from exposed animals carcasses during the period from February 2006 to January 2007 in Baghdad city. The results obtained showed that flies could be collected all over the year with variation of their population density in different seasons. The majority of the collected species were abundant during Spring and late Autumn (at lowest numbers) . In this investigation, nineteen species confined to four families were collected; these families are: Calliphoridae, Muscidae, Sarcophagidae and Fanniidae. The species Musca domestica Linn .was the most abundant followed by Chrysomya megacephala ( Fabricius ) , while Pollenia sp . and Fannia sp . were the least abundant species.