Preferred Language
Articles
/
abaa-153
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Study the Level of Service to Roadways which Leading to Basrah University
...Show More Authors

The building of Basrah University located in a rural area at Gramat Ali, its consist of seven colleges and very high number of students, lecturers ,and employers. Therefore, the intersections which leading to university building suffer congestion at morning peak hour (8-9) A.M and evening peak hour (2-3) P.M. In this study we collected the data in intersections which leading to university building at peak hour at same time, then we had analysis this data by using the highway capacity manual (HCM) and program (HCS). Also, we collected that data in University entries with classification of vehicles according to types and number of passengers at peak hour. Then we studied the number of proposals to riddance the congestion, such as the effe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Resmilitaris
Analysis of the relationship between the internal public debt and the public budget deficit in Iraq for the period from 2010-2020
...Show More Authors

The study aimed to analyze the relationship between the internal public debt and the public budget deficit in Iraq during the period 2010–2020 using descriptive and analytical approaches to the data of the financial phenomenon. Furthermore, to track the development of public debt and the percentage of its contribution to the public budget of Iraq during the study period. The study showed that the origin of the debt with its benefits consumes a large proportion of oil revenues through what is deducted from these revenues to pay the principal debt with interest, which hinders the development process in the country. It has been shownthat although there was a surplus in some years of study, it was not

... Show More
Scopus
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The biography of King Faisal I from the early period of his life to his building to the first step of the modern Iraqi state (1883-1924)
...Show More Authors

The environment and the placesthat prince Faisal Bin AL-Husein influenced his childhood ,
behaviourand future . his expereence in his early life in leading the battles and
arabRevoluionenriched him . inspite of his short periedand harsh experience of leadersmp.
he gained an experienencein ruling iraqadter 1921 . The Syrian experiencetaught him how to
deal with the strong and establish the government as he beliered in the slogan: independence
is taken not given. He established the consititution and the election . he made a solid
basefeconomy of in his time, Iraq , Iraq be came the country number ( 53) as an
independency country on the third of November 1932 . he died peacefuliy after Iraq's
indepence.

View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Fri Oct 10 2025
Journal Name
Journal Of Visualized Experiments
Explainable AI for Visual Inspection: A Comparative Analysis and Review
...Show More Authors

Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Experimentation in caves painting (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Onkologia I Radioterapia
The prevalence of lymph proliferative disorders in a group of Iraqi patients and its relation to blood indices parameters
...Show More Authors

Abstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619

View Publication
Scopus (1)
Scopus
Publication Date
Thu Jun 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
The Effectiveness of a Cognitive-Behavioral Treatment Program to Reduce Nervous Fatigue for Mothers of Children with Cerebral Palsy
...Show More Authors

Cognitive-behavioral therapy is one of the most important relatively recent; treatment programs that attempt to modify behavior and control psychological disorders by modifying the individual's thinking style and awareness of himself and his environment, and cognitive reconstruction by replacing negative thoughts with positive ones. The current study aimed to know the effectiveness of a cognitive behavioral treatment program in reducing nervous fatigue among mothers of children with cerebral palsy. The sample on which the nervous fatigue scale was applied consisted of (30) mothers whose son suffers from cerebral palsy, and the results indicated that (24) mothers suffer from nervous fatigue. This sample was divided

... Show More
View Publication Preview PDF
Crossref