Preferred Language
Articles
/
jcopolicy-558
Regionalism Hegemony of Political Life in Tunisia and its influence upon construction of Political System
...Show More Authors

The topic area of that’s paper dealing with regionalism hegemony upon ruling affairs and political life in Tunisia, this phenomena had historical origins, even before region of French occupation in 1881, after independence, the regionalism domination was practice and normal, the political system justified it's with many causes, like level of education, connection with Western civilization, enlighten intelligent, economic conditions in coast region and North of Tunisia compared with the South, also the role of President Bourqiba as founder of Modern Tunisia, he was from Monster (North of country) which was dominated as charismatic leader dedicate the regionalism domination through decades, yet after revolution in 2011, little changes have been influence upon conditions of South, its need more radical changes to alert the store type of Southern citizen toward authority, and acceptance of authority the southern citizen as full equal citizen have all rights and privileges of Northern citizen.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2014
Journal Name
International Journal Of Engineering And Innovative Technology (ijeit)
New Predictive Block Matching Searching Algorithms and Hybrid Predictive Search System
...Show More Authors

In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Apr 03 2023
Journal Name
Karbala International Journal Of Modern Science
Performance Estimation and System Modeling for Refractive Index Structure Constant Cn2
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
المجلة العراقية للعلوم السياسية
التغيرات المناخية واثرها على المرأة العراقية: دراسة في الاسباب وضرورات الاستجابة
...Show More Authors

تعد التغيرات المناخية قضية بيئية عالمية وشاغلاً مشتركاً للبشرية وهي نتيجة حتمية للتطور الحضاري، لاسيما بعد قيام الثورة الصناعية، فقد كان الاستهلاك غير العقلاني لموارد الطبيعة والتوسع العمراني على حساب المساحات الخضراء آثار خطيرة على المناخ الذي يعد من اهم عناصر البيئة الطبيعية لما له من اثر واضح على كافة مجالات الحياة. على صعيد الحالة العراقية يواجه العراق تحديات عدة يفرضها تغير المناخ كارتفاع درجات الحرا

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 24 2024
Journal Name
مجلة العلوم التربوية والنفسية
إقامة البرهان على من ادعى مخالفة النعمان في مسائل من الحدود
...Show More Authors

إن اختلاف الفقهاء مصدر عظيم لثروة فقهية كبيرة، ومن مظاهر الخلاف الفقهي مؤاخذات علمية يوردها بعض العلماء على علماء آخرين بدعوى مخالفتهم الأدلة الشرعية، أو القواعد المقررة لاستنباط الأحكام الشرعية، ومن تلك المؤاخذات ما أورده الإمام المحدث أبو بكر ابن أبي شيبة رحمه الله تعالى على أبي حنيفة النعمان رحمه الله حيث إنه ساق في مصنفه الكثير من الأحاديث والآثار التي عد الإمام أبا حنيفة رحمه الله مخالفا لما تقتضيه من

... Show More
Preview PDF
Publication Date
Sat Dec 02 2023
Journal Name
مجلة اكليل للدراسات الانسانية
تأثير المناخ على المقنن المائي لمحصول زهرة الشمس في محافظة ميسان
...Show More Authors