Preferred Language
Articles
/
abaa-306
Foreign Series in the Kurdish Satellite Channels and Their Role in the Development of Awareness among Young People in the Kurdistan Region (Korean Series as a Model) (A Field Study on a Sample of Students of the Institute of Fine Arts in the City of Sulay
...Show More Authors

The dubbing process for the Foreign Dramas by the Kurdish language became a serious phenomenon in the Kurdish satellite TV, especially in the past few years. It attracted a wide audience, especially young adolescents. And prepared by some breakthrough hostile to Kurdish culture and value coordinated by others remedy for the structural gaps and lapses have, as a result of climate which is brought into existence globalization and secretions variety dimensional, saturated value and cognitive effects bearing a strong identity of its elements. From here, the problem of this research is the ambiguity of their role in a series of developmental processes Kurdish awareness of young people and the extent of the impact that caused it.

This research is important from the theme referred to above, which is still an important focus on the priorities of community knowledge, information and technical and popular and others, as well as it studies the few that deal with this kind of soap operas and effects of development on the awareness of the youth, which contributes to the enrichment of Kurdish Library and alert researchers new interesting its other aspects that have not been studied yet.

This research as a description example aims to detect and confirm the type and importance of the information and knowledge provided by these serials for various community affairs and how they are displayed and interpreted, and to identify the motives of exposure receiver to those series and duration of time.

This research is somewhat descriptive research, which is through the study of the facts associated with the variables in question and clarifies, targeting recognized indicators laxatives to understand its ties with other phenomena. To achieve the objectives of this research, and to invoke the curriculum survey which demonstrated suitability for this purpose as proven by many scientific researches, I realized many important results, including:

  1. The information offered by the Korean series showed by the Kurdish satellite TV in the Kurdistan Region is adequate information and relative value, community events and crises in general.
  2. Sufficiency of those series to provide explanations and public surface phenomena and economic crisis and none sank in detail the structural and influential.
  3. Creating those negative effects series with the relative majority of respondents to the concepts of democracy and public freedoms, taking into consideration the dissenting views that compete with such a majority in number.
  4. The existence of contradictory assertions and relatively neutral, towards a pseudo- interpretation of the Korean Series about the fairness of factional strife in society and immortality.

The study, finally, sets some recommendations including:

  1. Follow-up young families for their children, especially adolescents and guiding them towards viewing main dramas.
  2. Kurdish interest in drama and the study develops and supports to bring it to the level of competition with foreign drama through productivity and up-gradation of art and technology.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Chemical Engineering Research And Design
Ternary glycerol-based deep eutectic solvents: Physicochemical properties and enzymatic activity
...Show More Authors

The present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a

... Show More
View Publication
Crossref (22)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DYE REMOVAL FROM TEXTILE WASTEWATER BY COAGULATION USING ALUM AND PAC
...Show More Authors

Removal of solar brown and direct black dyes by coagulation with two aluminum based
coagulants was conducted. The main objective is to examine the efficiency of these
coagulants in the treatment of dye polluted water discharged from Al-Kadhymia Textile
Company (Baghdad-Iraq). The performance of these coagulants was investigated through
jar test by comparing dye percent removal at different wastewater pH, coagulant dose,
and initial dye concentration. Results show that alum works better than PAC under acidic
media (5-6) and PAC works better under basic media (7-8) in the removal of both solar
brown and direct black dyes. Higher doses of PAC were required to achieve the
maximum removal efficiency under optimum pH co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (84)
Crossref (86)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Materials Today: Proceedings
Bimetallic (Fe/Zn-ZIF-8) crystals: Fabrication and adsorptive removal activity
...Show More Authors

This work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Determine, Predict and Map Soil pH Level by Fiber Optic Sensor
...Show More Authors
Abstract<p>Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.</p> ... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology &amp; Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Integration between value chain analysis and balanced scorecard to for performance evaluation
...Show More Authors

The performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h

... Show More
View Publication
Crossref (1)
Crossref