This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreMicrobial Desalination Cell (MDC) is capable of desalinating seawater, producing electrical power and treating wastewater. Previously, chemical cathodes were used, which were application restrictions due to operational expenses are quite high, low levels of long-term viability and high toxicity. A pure oxygen cathode was using, external resistance 50 and 150 k Ω were studied with two concentrations of NaCl in the desalination chamber 15-25 g/L which represents the concentration of brackish water and sea water. The highest energy productivity was obtained, which amounted to 44 and 46 mW/m3, and the maximum limit for desalination of saline water was (31% and 26%) for each of 25 g / L and 15 g / L, respectively, when using an ex
... Show MoreIt is an established fact that substantial amounts of oil usually remain in a reservoir after primary and secondary processes. Therefore; there is an ongoing effort to sweep that remaining oil. Field optimization includes many techniques. Horizontal wells are one of the most motivating factors for field optimization. The selection of new horizontal wells must be accompanied with the right selection of the well locations. However, modeling horizontal well locations by a trial and error method is a time consuming method. Therefore; a method of Artificial Neural Network (ANN) has been employed which helps to predict the optimum performance via proposed new wells locations by incorporatin
Autoría: Jehan Faris Yousif. Localización: Opción: Revista de Ciencias Humanas y Sociales. Nº. 89, 2019. Artículo de Revista en Dialnet.
This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe scientific and technological developments and their practical applications in all fields of life in general and in the education field in specific have led to the emergence of variables in the educational structure, teaching methods and in education in their modern form which is consistent in its entirety with the spirit of the age. We today live the age of knowledge increase full of wide ranging scientific and technological developments. Thus life demands human capabilities of a special kind able to develop and innovate. Here the increasing significance emerges for taking care of the human powers through educational systems much different from those current traditional systems. System
... Show MoreThe current research aims to evaluate the activities and evaluation questions implied in the content of the computer textbook for the fifth preparatory grade according to the creative thinking and developing suggestions through answering the following question: what is the percentage of creative thinking skills in the content of the computer textbook for the fifth Preparatory grade students issued by the Iraqi Ministry of Education/ Directorate General of the curriculum in the academic year (2019-2020)? The researchers followed the descriptive-analytical approach. The research community was determined by the content of the computer textbook for the fifth preparatory grade. As for the research sample, it was limited to all activitie
... Show More