The past decades of the last century and until now have witnessed many crises in the housing sector, and these crises were the result of many problems that led to a weak quality and quantity of housing stock, especially for lowincome people, and Goal 11 of the Sustainable Development Goals states, "Make cities and human settlements inclusive, safe, and capable of enduring and being sustainable, we have prepared this research that attempts to answer the following question: Is the current empowerment in the housing sector real and efficient support for people with limited income? The research assumes that empowerment in the housing sector has an important and effective role in reducing housing problems, the research aims to reach the most important indicators of Empowerment in affordable housing And discussed in the light of the study area, the research relied on the descriptive-analytical approach and a questionnaire was made for a random sample of 60 people distributed among experts in the housing sector, local authority, non-governmental organizations, and the local community. The research recommends the need to support the category of low-income citizens and give them flexible and affordable loans to help them own a housing unit and to take into account the conditions of the site to ensure that they do not bear additional transportation costs resulting from moving to the city center, especially for students and workers.
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
Finding a new source of resistance is important to reduce the use of synthetic pesticides, which can meet the global need of suppressing pollution. In this study, the resistance of eight eggplant cultivars to Aphis gossypii was evaluated. Results of the current study highlighted that the cultivar Long-Green has a very strong resistance after 14 days post infestation whereas Pearl-Round and White-Casper cultivars were susceptible. The rest of the tested cultivars (Green-oblong, Purple-panter, Paris, Ashbilia, and Barcelona) had mild resistance. Also, the study found significant differences between the infested and non-infested plants among the tested cultivars in the plant’s height, fresh-, and dry-weight. The susceptible cultivars
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show More