The results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry has been shown in the West since early, in the form of interest in the social engineering of the individual and society rather than in the interest of political engineering. If, in the early stages of Western history, the motives and practical applications of social engineering took the form of socio-political education, which in the past had no other forms
أصبحت التنشئة الاجتماعية السليمة من أكثر الأدوات في التصدي لأوبئـة العنف والتطرف ومظاهرها المتفشية بصورة أو بأخرى في مجتمعاتنـا المعاصـرة عامـة باختلاف أيديولوجياته الفكرية ومعتقداته الدينيـة ومسـتوى نموهـا الاقتصـادي، وأصبحت بأشكالها المتنوعة معنية بترسيخ التعاليم الدينيـة السـمحة وغـرس القـيم الديمقراطية السليمة ومبادئ وقيم حقوق الإنسان في شتى مجالات الحياة الإنسانية، وهي أيضا تعد حجر الأساس من اج
... Show Moreأصبحت التنشئة الاجتماعية السليمة من أكثر الأدوات في التصدي لأوبئـة العنف والتطرف ومظاهرها المتفشية بصورة أو بأخرى في مجتمعاتنـا المعاصـرة عامـة باختلاف أيديولوجياته الفكرية ومعتقداته الدينيـة ومسـتوى نموهـا الاقتصـادي، وأصبحت بأشكالها المتنوعة معنية بترسيخ التعاليم الدينيـة السـمحة وغـرس القـيم الديمقراطية السليمة ومبادئ وقيم حقوق الإنسان في شتى مجالات الحياة الإنسانية، وهي أيضا تعد حجر الأساس من اج
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreUsing sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III) ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to
... Show MoreThis topic is considered to be of a high degree of importance to every Muslim, and its importance is due to the fact that monotheism is:
Prove that God Almighty is the God who created everything and everything opposite to monotheism is polytheism, and it is taking other than God Almighty as a deity.
Therefore, we have to know the concept of God. If he is known, then he knows the concept of monotheism and the concept of polytheism
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show More