Recent population studies have shown that placenta accreta spectrum (PAS) disorders remain undiagnosed before delivery in half to two-thirds of cases. In a series from specialist diagnostic units in the USA, around one-third of cases of PAS disorders were not diagnosed during pregnancy. Maternal
This research study of influence of Chinese thought on porcelain in the tang and song period, the study came into four sections, which are:
* First section contains general framework of the research, which include the problem, which is represented by following of questions:
1- Is there intellectual and ideological dimensions in Chinese porcelain?
2-What are the mechanisms and techniques of Chinese porcelain?
.the importance of this research and the need counted as a study providing cognitive addition into the Chinese arts field, especially ceramics of the Chinese. The aim of the research included of areas of artistic creativity in Chinese pottery and ceramics according to the bases of construction and composition. As the impo
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).
The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,
... Show More