Investigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent
In this paper, I highlight the bishops mentioned in the Bible in its sections
(The Old and New Testaments) where these books still retain the remaining remnant of the Bible
Issuing the prophets who preceded the mission of the Prophet Muhammad (peace and blessings of Allaah be upon him) and they must pray
And peace, as those bishops were mentioned in the Book of Formation through the recitation of the psalms
To Habakkuk, Malakhi, and Hajji.
As well as in the New Testament, which we see clearly in the four Angels: Matthew, Luke,
Disco, John.
Then the male lamented what was said of those bishops by expressing the eternal heavenly book (the Qur'an)
Al - Karim) as he focuses on this subject from multiple angles and exp
Background: Knowledge about the prevalence and distribution of pathologies in a particular location is important when a differential diagnosis is being formulated. The aim of this study was to describe the prevalence and the clinicopathological features of odontogenic cysts and tumors affecting the maxilla and to discuss the unusual presentation of those lesions within maxillary sinus.
Materials and Methods: A multicenter retrospective analysis was performed on pathology archives of patients who were diagnosed with maxillary odontogenic cysts and tumors from 2010 to 2020. Data were collected with respect to age, gender and location.
Result: A total of 384 cases was identified, 320 (83.3%) cases were diagnosed as odontogenic
... Show MoreIn light of the developments and intense competition that the world has witnessed, the need to search for a sustainable and continuous competitive advantage for economic units has emerged, as the economic units must not lose sight of their interest in the activities they perform to achieve that advantage, and it can be said that the goal of the research is to identify the theoretical dimensions of the green value chain represented by: (Green research and development, green design, green manufacturing, green marketing, green services) and the dimensions of the sustainable competitive advantage represented by (quality, creativity, innovation, cost, response to the customer), as well as identifyi
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreThe study showed that all extracts (aqueous, ethanolic and acetonic) of the leaves of Eucalyptus and Myrtus plants had a inhibitory effect on the growth of all types of yeasts studied, acetone extract recorded the highest inhibition of yeastat 100ppm concentration,The inhibition was 35mm, 34mm, 24mm and 20mm for Candida parapsilosis, Candida glabrata, Candida tropicalis and Candida albicans respectively, The experiments above showed the least significant differences at 0.05 level.The results ofE. Cammldulensis ethanolic tincture analysis has shown the presence of 44 biologically active substances. The main Eucalyptus leaves component was: 2-Bicyclo (2-2.1) heptanol (12.37%), Ledol (8.23%),1,2,4- Benzenetriol (8.45%) and that contain spathul
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More