The monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non
... Show MoreMobile phones are widely used nowadays, for different application such as wireless control and monitoring due to its availability and ease of use. The implemented system is based on "global system mobile (GSM)" network by using "short message service (SMS)". The design mainly contains a GSM modem and interfacing unit circuit with microcontrollers. This system could control up to eight different electrical devices such as light, Air conditioner, washing machine and many more applications which needed in daily life in different area (House, Office, or factory, etc.). The control is done by sending a specific SMS messages from traditional or smart phone. The controlling devices are restricted to a pre-defined phone number and are set in the so
... Show MoreThis study aims to identify how the Zakat Fund contributes to financing entrepreneurial projects; and the role that these projects play in achieving economic and social development, despite the importance that contracting projects have in most countries as the main engine of growth; however, they still face many challenges that In the forefront of which is the challenge of obtaining financing; in this regard, it is possible to resort to the use of Zakat funds in the Islamic economy as it is a funding source that is closely proportional to the characteristics and goals of entrepreneurial projects in achieving development;
 
... Show MoreThe study aims to identify the role of family in inculcating the moral values of voluntary work among adults, as it constitutes the basic social institution that is responsible for raising and control children. It has regarded as the first phase of constituting societies, where family plays a significant role in changing the behavior of individuals positively or negatively through provided patterns. The moral values act as organizer of human relationship in which misusing of these values would affect the interaction between people. This study focuses on how to employ the moral values in voluntary work as a civilized behavior helps in developing and strengthening societies. The researcher adopted the analytical-descriptive approach as mor
... Show MoreThe study aimed to identify the role of the teacher in confronting intellectual extremism in high school students, and identify the differences of statistical significance in the role of teacher in confronting intellectual extremism in secondary school students according to gender variable (males, females) and the duration of service (less than 5 years more than 5 years), the sample was consisted of (100) teachers with (50) male and (50) female in the city of Bayaa, Dora and Sadiya, the measure of intellectual extremism was applied by the researcher, and the study reached a role of the teacher in facing the intellectual extremism at Secondary school students, and the existence of differences of statistical significance in the role
... Show MoreThe electoral mechanism is remarkably clear, a political tool for institutional construction, directing political life, forming the political scene, and forming the partisan scene. This process was through the design of electoral laws, as elections in Tunisian political history represented the indicator of its slow and accelerated transformations, so The elections in Tunisia usually coincide with important political stages, accompanied by legislative or constitutional amendments in general, Islamic or secular forces have played a fundamental role in promoting the democratic experience and the principle of the peaceful transfer of power. This led to the formation of a national consensus that would help the country not enter into political
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreToxoplasma gondii is a unique intracellular parasite, which infect a large proportion of the world population, but uncommonly causes clinically significant disease. The present study was performed to estimate the prevalence of toxoplasmosis in 400 apparently healthy blood donor males, their ages were between 18 and 57 years using enzyme linked immunosorbent assay, and to examine the effects of infection on total testosterone, free testosterone and follicle stimulating hormone (FSH) levels in their sera. Seroprevalence showed 10 (2.5 %) and 121 (30 %) of them had IgM and IgG antibodies respectively. Both acute and chronic toxoplasmosis in males recorded higher significant (P < 0.05) mean concentration for total and free testosterone hormone,
... Show More