This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to 92.19%, availability 92.375%, and reliability 100%. The proposed system managed five devices. The NSFM implemented using Java and C# languages.
Jean-Paul Sartre and Badr Shakir al-Sayyabe are among the most prominent writers that critiqued the destructive role of capitalism and the patriarchal power system in the period of the Post-World War II crisis. Divided into three chapters, the present study examines two of the most eminent literary works in the history of the Western and Eastern societies in the fifties of the last decade: Jean Paul Sartre’s play : The Respectful Prostitute and Badr Shaker al-Sayyabe’s poem: The Blind Prostitute.
Chapter one discusses the position of the prostitute in a patriarchal societies. Chapter two linguistically analy
... Show MoreThe characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show MoreLegislative language is characterized by its complexity, specifically in the process of translating statutory terms from two quite different languages, and from totally two different legal systems as from Spanish into Arabic. The present study stresses the process of translating legislative terms used in Spanish wills into Arabic through high lightening the polysemy of such mentioned terms and explaining their use in other legislative grounds. Additionally, the present study elucidates, analyzes, underlines the difficulty and looks for the most appropriate procedures and techniques of translating some of the prominent inheritance expressions taking in account the legislative dif
... Show MorePropaganda speech in the Gulf press articles about the Qatari crisis, an analytical study in the political articles published in the newspapers (Riyadh) Saudi Arabia and (Al-Ittihad) UAE from 5/6/2017 to 5/9/2017, University of Baghdad, College of Media, Press Department, 2019. The problem of the research was to monitor the contents of propaganda messages to Saudi Arabia and the UAE regarding the Qatari crisis, especially with the escalation of propaganda media campaigns between the four boycotting countries on the one hand and Qatar on the other hand, in light of crises and conflicts in the Gulf region and the Arab region in general. The researcher used the survey method to answer the research questions and achieve its results. This res
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreABSTRACT: In dental practice there are many wrong habits that should be recognized and treated. One of them is the irrational antibiotic (AB) administration by patient. This indeed created an important issue in dental clinics first of all drug resistance and super infection. This was analyzed in our study and then the causes were identified and a plan suggested in recommendation hope that it will minimize the outcomes. Results: all those patients were finally subjected to be clinically diagnosed and treated this lead to only one fact, these antibiotics are not effective in one way or another since they are not prescribed by dentist
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreNations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and
... Show More