In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThe architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
The tourism industry has undergone exponential transformation, reshaped by online travel agencies (OTAs), shifting consumer preferences, and technological advancements. Established OTAs like TripAdvisor and Travelocity face pressures to adapt their strategies to capitalize on these disruptive landscape changes. This research involves a comparative analysis examining the key challenges confronting TripAdvisor and Travelocity, with a focus on opportunities to leverage artificial intelligence (AI) in enhancing personalization and the traveler experience. The study utilizes publicly available data on the companies and academic literature on AI innovation diffusion. Findings reveal that while TripAdvisor has actively developed AI-based trip plan
... Show MoreConstructional Efficiency in architecture in general is one of the most important standard success for any structure and a measure of its continuity and relevance across time and space. Given the importance of Al-Ahwaar environment that owned the spatial, environmental, economic and social elements had a prominent impact in creation of architecture patterns form to create special architectural and structural environment, which had many qualities and ingredients that contributed to its continuity and existence over the years. From the premise that man and his environment is the main goal to any architectural style,
Thus the research problem focusing on the lack of clarity of the previous literatures in its st
... Show MoreThis study attempts to focus on there lation ship between employment policies andsocietal changesinIraq.Theconstruction ofoperational policyincommunitiesin crisis remains fraught with challenges and risks, especially in countries that have longoutstanding conflict sand crises, it is important in this context to achieve those policy and build the foundations of human security and poverty alleviation, unemployment, to find effective ways to help the community to achieve stability and reduce the risk of renew edorrepeat the cycleofviolence-butthatwouldrequirearadicalrethinking, including rethinking the way evaluating therisksandchallengesand management.And thatsuchaprojectshouldbe based ona clear roadmap, andthevisionsofdevelopmentanda clea
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show More