Preferred Language
Articles
/
abaa-222
Electronic media and social issues in Algeria The podcast technique is a model
...Show More Authors

This study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of phenomena prevalent in society.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Classic Local Least Estimatop And Bayesian Methoid For Estimating Semiparametric Logistic Regression Model
...Show More Authors

Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.

We compare two methods Bayesian and . Then the results were compared using MSe criteria.

A simulation had been used to study the empirical behavior for the Logistic model , with  different sample sizes and variances. The results using represent that the Bayesian method is better than the   at small samples sizes.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Nov 25 2020
Journal Name
Plos One
Impact of the COVID-19 pandemic on medical education: Medical students’ knowledge, attitudes, and practices regarding electronic learning
...Show More Authors

The Coronavirus Disease 2019 (COVID-19) pandemic has caused an unprecedented disruption in medical education and healthcare systems worldwide. The disease can cause life-threatening conditions and it presents challenges for medical education, as instructors must deliver lectures safely, while ensuring the integrity and continuity of the medical education process. It is therefore important to assess the usability of online learning methods, and to determine their feasibility and adequacy for medical students. We aimed to provide an overview of the situation experienced by medical students during the COVID-19 pandemic, and to determine the knowledge, attitudes, and practices of medical students regarding electronic medical education.

... Show More
View Publication
Scopus (466)
Crossref (471)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effect of Dunn Dunn model on students’ achievement in Geography course
...Show More Authors

The study seeks to investigate the effect of Dunn Dunn learning style model on students’ achievement. Besides, the way of developing students’ deductive thinking by testing the null hypothesis: there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05). Additionally, there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05) on testing developing deductive thinking skills. The researcher adopted a quasi-experimental posttest

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 22 2019
Journal Name
Arab Science Heritage Journal
الاسطوغرفيا العثمانية التركية حول ثيمة محمية الجزائر في الفترة العثمانية ما بين - الموضوعية العلمية والذاتية المؤدلجة
...Show More Authors

تضمّنت الاسطوغرافيا العثمانية التركية حول ثيمة محمية الج ا زئر في -
الفترة العثمانية مؤلفات صُبغت بعضيا بطابع الموالاة والتحيّز

View Publication Preview PDF