The investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of information in a smooth and logical manner, creating an atmosphere of anticipation, tension and curiosity for the recipient.
The research aims to achieve a manuscript of Imam Al-Ghazali, may God have mercy on him, verify the attribution of this manuscript to the author, copy the text and serve it in a manner that suits the principles of scientific research in the investigation of manuscripts
عملية تغيير حجم الصورة في مجال معالجة الصور باستخدام التحويلات الهندسية بدون تغيير دقة الصورة تعرف ب image scaling او image resizing. عملية تغيير حجم الصورة لها تطبيقات واسعة في مجال الحاسوب والهاتف النقال والاجهزة الالكترونية الاخرى. يقترح هذا البحث طريقة لتغيير حجم الصورة باستخدام المعادلات الخاصة بمنحني Bezier وكيفية الحصول على افضل نتائج. تم استخدام Bezier curve في اعمال سابقة في مجالات مختلفة ولكن في هذا البحث تم استخد
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show Moreهدف هذا البحث الى استعمال الأسلوب الرياضي أسلوب التحليل الهرمي وتطبيقه وفق ابعاد بطاقة الاداء المتوازن في تقييم الأداء الاستراتيجي في الهيئة العامة للأثار والتراث، وتمثلت أدوات البحث باستعمال استمارات التحليل الهرمي وطبقت على معايير بطاقة الأداء المتوازن المتمثلة في (المالي، الزبائن، العمليات الداخلية، والتعلم والنمو)، وتم استهداف عينة قصدية متمثلة في رئيس الهيئة والمدراء العامون بعض من مدراء الأقسام ال
... Show MoreObjective: The aim of this study is to detect the effect of continuous exposure to Sodium Nitrite on 8-oxoguanine
DNA glycosylase (OGG1) gene which responsible on DNA repairs. DNA repair play a major role in maintaining
genomic stability when DNA exposure to damage. Genomic stability is very important for keeping body cells
healthy and to prevent many types of tumor development. Many genes are responsible for this job; one of them is
OGG1 gene.
Methodology: In current study two groups of mice were chronically exposed to sodium nitrite for six months and
eighteen months while third group was used as a control. Then sizes of OGG1 were estimated.
Results: The results exhibited in the unexposed (control) mice had two dif
This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreThe research deals with the Presidents of the Christians who called themselves (Ghaltka) in the book titled (orient chirsy patriarchs) that talked about their scientific practical biography adding to) that their completeness on the position of Ghaltka with its decrees and caliphs who were contemporaries to them ,as well as their places, deaths, cemeteries and their accomplishments In accordance with the powers granted to them and also it mentions the situation of The Abbasid caliphate with them and with the sons of their sect .