Current search targeted to:
1 - Measurement of double-thinking among university students.
2 - Identify the significant differences in the degrees of double-thinking members of the sample according to the variables of sex (male - female), specialty (I know - a human).
To achieve the objectives of the research chose researcher samples from the community of the first search for statistical analysis, has reached 400 students, and the second sample of the application of the final, has reached (480) students were selected randomly with simple check of equal value, and the researcher building a search tool double think, After the completion of the scale-building measures think
This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe influx of Arab Qahtani and Nizari tribes continued to the countries of Baluchistan and the Levant in pre-Islamic times until the Levant became open to the Arab-Islamic tide during the first century AH. The Islamic Orient until the early Islamic Arab Army reached the western borders of China. What we will see in the folds of the search.
Forecasting is one of the important topics in the analysis of time series, as the importance of forecasting in the economic field has emerged in order to achieve economic growth. Therefore, accurate forecasting of time series is one of the most important challenges that we seek to make the best decision, the aim of the research is to suggest employing hybrid models to predict daily crude oil prices. The hybrid model consists of integrating the linear component, which represents Box Jenkins models, and the non-linear component, which represents one of the methods of artificial intelligence, which is the artificial neural network (ANN), support vector regression (SVR) algorithm and it was shown that the proposed hybrid models in the predicti
... Show MoreThe importance of forecasting has emerged in the economic field in order to achieve economic growth, as forecasting is one of the important topics in the analysis of time series, and accurate forecasting of time series is one of the most important challenges in which we seek to make the best decision. The aim of the research is to suggest the use of hybrid models for forecasting the daily crude oil prices as the hybrid model consists of integrating the linear component, which represents Box Jenkins models and the non-linear component, which represents one of the methods of artificial intelligence, which is long short term memory (LSTM) and the gated recurrent unit (GRU) which represents deep learning models. It was found that the proposed h
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
The flexible joint robot manipulators provide various benefits, but also present many control challenges such as nonlinearities, strong coupling, vibration, etc. This paper proposes optimal second order integral sliding mode control (OSOISMC) for a single link flexible joint manipulator to achieve robust and smooth performance. Firstly, the integral sliding mode control is designed, which consists of a linear quadratic regulator (LQR) as a nominal control, and switching control. This control guarantees the system robustness for the entire process. Then, a nonsingularterminal sliding surface is added to give a second order integral sliding mode control (SOISMC), which reduces chartering effect and gives the finite time convergence as well. S
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show More