The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve
... Show MoreMost of us are tired of the circumstances that surround us because of their deficiency, deprivation, and sullenness, even though troubles and pains are the soil in which the seeds of strong personality sprout.
The content of the research is summed up in the fact that there is no need to frown, so let our face be free, and our word good and tolerant, so that we can be the most loving people of those who give them, and the Messenger of God (may God’s prayers and peace be upon him and his family) was known to be the heaviest concerns of people, but he was most smiling of people, by smiling, we buy lives, so we should get used to it, because that gives us hope and finds the world in our hands, an
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MorePatients infected with the COVID-19 virus develop severe pneumonia, which typically results in death. Radiological data show that the disease involves interstitial lung involvement, lung opacities, bilateral ground-glass opacities, and patchy opacities. This study aimed to improve COVID-19 diagnosis via radiological chest X-ray (CXR) image analysis, making a substantial contribution to the development of a mobile application that efficiently identifies COVID-19, saving medical professionals time and resources. It also allows for timely preventative interventions by using more than 18000 CXR lung images and the MobileNetV2 convolutional neural network (CNN) architecture. The MobileNetV2 deep-learning model performances were evaluated
... Show MoreObjective conditions for the possibility of punishment are legal or material facts –positive or negative that depart from the activity of the offender. The legislator comments on their subsequent verification on the formation of some crimes the possibility of.The application of punishment to the offender , but although they are facts of an object nature that approach and overlap with many systems and cases , they are distinguished by a certain subjectivity that differentiates them from each case that may seem similar or approach them. To clarify the ambiguity that may surround these conditions , Which may lead to confusion between them and what be similar to other cases due to the common effect that they have in common , which is the f
... Show MoreIt is well-known that the existence of outliers in the data will adversely affect the efficiency of estimation and results of the current study. In this paper four methods will be studied to detect outliers for the multiple linear regression model in two cases : first, in real data; and secondly, after adding the outliers to data and the attempt to detect it. The study is conducted for samples with different sizes, and uses three measures for comparing between these methods . These three measures are : the mask, dumping and standard error of the estimate.