لقد كان للثورة الرقمية التي ظهرت في القرن العشرين أثر في إحداث تأثيرات جذرية تضمنت نواحي الحياة المختلفة، خصوصًا في المجال الإقتصادي، والتي تمثلت بثلاث صور ( الذكاء الإصطناعيArtificial Intelligence( AI) وإنترنت الأشياء Internet of Things والبيانات الضخمة Big Data ، وفيما يتعلق بالذكاء الإصطناعي، فقد تم إكتشافهُ في منتصف خمسينات القرن الماضي الذي تعد الولادة الحقيقية لهُ في المؤتمر الذي نُظم في الولايات المتحدة الأمريكية على يد العالمان John McCarthyو Marvin Minsky ، وعلى مرًّ السنين تطورت تقنيات الذكاء الإصطناعي بشكل متسارع الى أن وصلت بعض التطبيقات أن تكون لها القدرة على التعلم الذاتي من المواقف التي تمرًّ بها، فتتصرف بأستقلالية وفقًا للظروف والمواقف المحيطة بها، كالطأئرات المسيَّرة ذاتيًا والسيارت ذاتية القيادة والروبوتات وغيرها، وعلى الرغم من الفوائد التي لاتُعّد ولا تُحصى للذكاء الإصطناعي وتطبيقاته في المجالات الطبية والعسكرية والتعليمة وغيرها، إلا أن لهذه التطبيقات أثر سلبي على الإنسان فقد نتج عن استخدامها المساس بالمصالح المحمية قانونًا، لذا يؤدي ظهورها ، التفكير بشكل جديَّ حول التأثيرات المستجدة التي ستُحدثها هذه التقنية الثورية بما تملكه من إمكانيات متطورة ومقدرة على التصرف بشكل ذاتي ودون الحاجة لأي تدخل بشري ، لذا تحتم ﻋﻠﻰ اﻟﻤﺸﺮع إﻋﺎدة ﺗﻜﯿﯿﻒ ﻗﻮاﻋﺪه اﻟﻘﺎﻧﻮﻧﯿﺔ ذات اﻟﻤﺪﻟﻮل اﻟﻮاﻗﻌﻲ واﻟﻤﺎدي من أجل التعامل ﻣﻊ واﻗﻊ إﻓﺘﺮاﺿﻲ ﻏﯿﺮ ﻣﻠﻤﻮس ﻓﻲ حالات متعددة تحديدًا ﻣﻊ مرحلة إﻧﺘﻘﺎل ﻓﻜﺮة اﻟﺬﻛﺎء الإﺻﻄﻨﺎﻋﻲ ﻣﻦ الإطار اﻟﻤﻌﻨﻮي ﻏﯿﺮ اﻟﻤﻠﻤﻮس واﻟﺨﺎص، إﻟﻰ الإطار اﻟﻤﺎدي اﻟﻤﺤﺴﻮس واﻟﻌﺎم، وﻣﻦ إطﺎر اﻟﺒﺮﻣﺠﯿﺎت سهلة التحكم إﻟﻰ ﻧﻈﺎم اﻟﺒﺮﻣﺠﯿﺎت اﻟﺬﻛﯿﺔ، ﺳﻮاء تعلق هذا الأمر بتطور قدرات البشر أو تطوير تطبيقات الذكاء الإصطناعي من الناحية الفيزيائية أو المادية بصورة تحاكي البشر في تصرفاتهم وأفعالهم لذا الحاجة تستدعي التأطير القانوني للقواعد التي تحكم هذا الذكاء وتحديد المسؤولية المدنية والجنائية بصورتي العمد والخطأ الناجمة عن كل أخلال يصيب المصالح المحمية. Abstract The digital revolution that emerged in the twentieth century had a radical impact on various aspects of life, especially in the economic industry, which included three forms (Artificial Intelligence (AI), the Internet of Things, and Big Data. With regard to artificial intelligence, it was discovered in the mid-fifties of the last century, and its real birth was at the conference organized in the United States of America by the scientists John McCarthy and Marvin Minsky. Over the years, artificial intelligence techniques have developed rapidly until some applications have reached the ability to self-learn from the situations that they encounter and act independently according to the circumstances and situations surrounding it, such as drones, driverless cars, robots, etc., and despite the countless benefits of artificial intelligence and its applications in the medical, military, educational, and other fields, these applications have a negative impact on humans, which may result in using it to harm legally protected interests. Therefore, the emergence of artificial intelligence applications leads to serious thinking about the new effects that this revolutionary technology will have with its advanced capabilities and the ability to act independently and without the need for any intervention .Therefore, it is necessary for the legislator to readapt its legal rules with a realistic and material meaning in order to deal with a hypothetical, intangible occurrence occurs in several cases, specifically with the transition of the idea of artificial intelligence from the established framework from the intangible and private intention, to the concrete, tangible and public framework, and from the easy-to-control software framework to the intelligent software system, whether this matter relates to the development of human capabilities or the development of artificial intelligence applications from a physical or physical perspective in a way that mimics humans in their behavior and actions. Therefore, the need demands for legal framing of the rules that govern this intelligence and determining civil and criminal liability weather it is intentionality and unintentionally that resulting from every breach of the protected interest
Harold Pinter often portrays the dilemma of obliterated figures that are incapable of feeling of their own existences. These figures feel exhausted and frustrated in a world that deprives them their humanity. They retreat into a limited world where they look for security and protection. The characters' feeling of security is threatened by outside forces represented by intruding persons who stand for the mysterious powers that are indefinable. The conflict between these intruders and the characters finally ends with the characters’ defeat. The reason for the intruders' attack on the victims remains ambiguous and is not explained. The element of mystery pervades Pinter's plays and represents one of
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe investment contract that has a foreign element is considered amongst the contracts that have their legal and international economical weight, for what it represents in all countries’ economies, and achieving progress in many fields that investment has its effects on their growth and establishment as its at the centre of everyone’s attention. As well as that the variety in opinions and the presence of differences in the contents of these contracts, and the confusion between them and other international contracts, and the considerable interest jurists have in them have all led to not having a legal definition for them, as most definitions the describe them are more economical than they are legal, and the reason for that is that law
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreThe analysis of detective novels has taken different aspects. The linguistic analysis of them, for example, has tackled the linguistic systems of morphology, phonology, syntax, semantics, and pragmatics. In line with the linguistic analysis, this study explores the various pragmatic and stylistic devices realized through detective novels for the purpose of misdirecting and deceiving the reader. The problem is that when readers try to reach to the truth, they face difficulties. They might not reach to the right solution or infer wrong conclusions because writers use some techniques to hide the truth and mislead them. This study aims at examining these techniques and devices; namely, Grice's Maxims and ambiguity as pragmatic devices on the
... Show MoreBackground: Data on SARS-CoV-2 from developing countries is not entirely accurate, demanding incorporating digital epidemiology data on the pandemic.
Objectives: To reconcile non-Bayesian models and artificial intelligence connected with digital and classical (non-digital) epidemiological data on SARS-CoV-2 pandemic in Iraq.
Results: Baghdad and Sulaymaniyah represented statistical outliers in connection with daily cases and recoveries, and daily deaths, respectively. Multivariate tests and neural networks detected a predictor effect of deaths, recoveries, and daily cases on web searches concerning two search terms, "كورونا" and "Coronavirus" (Pillai's Trace val
The existence of contractual responsibility, together with civil liability, provoked a profound disagreement in jurisprudence that amounted to a claim to renounce the traditional division between the two responsibilities, and to adhere to uniform rules governing civil liability provisions. These calls have increased and culminated in the writings of the scholar Philip Remy, who explicitly called to the abolition of contractual responsibility, therefore, this research is an attempt to review the modern doctrinal views that denied the existence of contractual responsibility as an independent system Beside civil liability, and to demonstrate the validity to benefit from them in the development of our legislative systems and God conciliator.
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.