Preferred Language
Articles
/
xhjiN5QBVTCNdQwCrANM
Types and functions of comparisons (based on Russian and Arabic phraseological units) Типы и функции сравнений (на материале русских и арабских фразеологизмов) انواع ووظائف المقارنات )في االمثال الروسية والعربية
...Show More Authors

Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russian and Arabic. We have explained in detail the types of comparisons (metaphorical and objective), their structure and main functions. We also analyzed the comparative constructions of Russian and Arabic linguistic units.

Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Sep 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of regional bond strength among different types of posts luted with different types of cement
...Show More Authors

Background: This in vitro study was carried out to investigate the effect of post space regions (coronal, middle and apical), the effect of post types ( Manually Milled Zirconia post, Prefabricated Fiber post, prefabricated Zirconia post) and the type of cement used (GIC, self-adhesive resin cement) on the bond strength between the posts and root dentin by using push-out test. Material and methods: Forty eight mandibular premolars extracted for orthodontic reasons (single rooted) were instrumented with ProTaper system (hand use) and obturated with gutta percha for ProTaper using AH26® root canal sealer following the manufacturer instructions. After 24 hours, post space was prepared using Zirix and Glassix drills no.3 creating 8 mm dept

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
CERTAIN FAMILY OF MULTIVALENT FUNCTIONS ASSOCIATED WITH SUBORDINATION
...Show More Authors
Abstract<p>We have studied new subclass B (A, B,γ) over multivalent functions. We have present some effects because of the category B (A, B,γ). We bear mentioned simple properties, convolution properties, incomplete sums, weighted mean, arithmetic mean, linear combination, inclusion rapport and neighborhood properties, software concerning fractional calculus then vile residences because of both the classes…</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Jun 10 2022
Journal Name
Eurasian Chemical Communications
Detection of lead and cadmium in types of chips from local markets in Baghdad
...Show More Authors

View Publication
Scopus (1)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Effects of Bedding Types on the Behavior of Large Diameter GRP Flexible Sewer Pipes
...Show More Authors

Flexible pipes, such as GRP pipes, serve as effective underground infrastructure especially as sewer pipeline. This study is an attempt for understanding the effects of bedding types on the behavior of large diameter GRP flexible sewer pipes using three dimensional finite element approaches. Theoretical and numerical analyses were performed using both BS EN 1295-1 approach and finite element method (ABAQUS software). The effects of different parameters are studied such as, depth of backfill, bedding compaction, and backfill compaction. Due to compaction, an increase in the bedding compaction modulus (E’1) results in a reduction of both stresses and displacements of the pipe, especially, for well compacted ba

... Show More
View Publication Preview PDF