The goal of the research is to theoretically establish the variable of brilliant leadership and explain the importance of this variable and the philosophical orientation of researchers in taking it as an original variable in their research as an independent variable. The descriptive approach and theoretical framing of brilliant leadership were followed. We relied on secondary data represented by books, dissertations, dissertations, scientific research, and the information network (the Internet) as a tool for collecting data. The scientific value was represented by the importance of consolidating brilliant leadership and reviewing the most important things that were confirmed by the research and studies that dealt with this research.
... Show MoreBackground: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advan
... Show MoreDeep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show MoreDeep learning techniques are used across a wide range of fields for several applications. In recent years, deep learning-based object detection from aerial or terrestrial photos has gained popularity as a study topic. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles andclassification probabilities for an image. In layman's terms, it is a technique for instantly identifying and rec
... Show MoreThe fatty acid composition in the seed and flower of Ligustrun lucidum and olive oil was studied by Gas Chromatography. Results showed that the main components of seed oil were Palmitic (C16:0) 5,893% ,Palmitolic acid (C16:1)0,398%, Steaeic (C18:0)2,911% ,Oleic (C18:1)74,984%,Linoleic (C18:2) 12,959%,and Linolenic (C18:3) 0,997%. The proportion of unsaturated fatty acid was above 89,338%, so the seed oil of L. lucidum ait belonged to unsaturated oil which possessed promising application. The components of flower oil were Palmitic (C16:0) 65,674% ,Palmitolic acid (C16:1)6,516%, Steaeic (C18:0)2,641% ,Oleic (C18:1)14,707%,Linoleic (C18:2) 3,113%,and Linolenic (C18:3) 2,70%. The proportion of unsaturated fatty acid and saturated fatty acid wa
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreThe use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models
In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show More