Preferred Language
Articles
/
rhh0iZQBVTCNdQwCGxw-
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Lambert Academic Publishing
📖[PDF] The digital discourse of action video games de Nassier A. G. Al-Zubaidi eBook | Perlego
...Show More Authors

Videogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the

... Show More
View Publication
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar
...Show More Authors

The current paper aims at knowing the effect of  Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.

The current paper is confined to a sample of  Basic 7th Class Female Students-  Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students  distributed on two sections ( A,B) . Section A represented  experimental group ( 24) female  students  studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups  b

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
The 4th International Virtual Conference In Educational And Human Sciences, Arts, And Languages
Measuring Situational Language Teaching to English Student's Speaking in Private Schools
...Show More Authors

English teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to th

... Show More
View Publication
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref