In recent years images have been used widely by online social networks providers or numerous organizations such as governments, police departments, colleges, universities, and private companies. It held in vast databases. Thus, efficient storage of such images is advantageous and its compression is an appealing application. Image compression generally represents the significant image information compactly with a smaller size of bytes while insignificant image information (redundancy) already been removed for this reason image compression has an important role in data transfer and storage especially due to the data explosion that is increasing significantly. It is a challenging task since there are highly complex unknown correlat
... Show MoreThe proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue
... Show MoreThis book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. I
Seventy five E. coli isolates were collected from urine of patients with urinary tract infections in AL-Kadhimia and AL-Yarmook teaching hospitals in Baghdad for a period between 22/11/2009 to 15/3/2010, from these samples twenty five isolates were selected according to their pattern of the highest resistance as these showing multi-drug resistances and tested to specify their minimum inhibitory concentration for (meropenem, gentamicin and amikacin), meropenem was found having the lowest MIC comparing with others. This study also includes in vitro effects of various combinations of three types of antimicrobials (meropenem, gentamicin and amikacin) against twenty five E. c
... Show MoreAbstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show MoreInformation and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality,
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreMachine learning (ML) is a key component within the broader field of artificial intelligence (AI) that employs statistical methods to empower computers with the ability to learn and make decisions autonomously, without the need for explicit programming. It is founded on the concept that computers can acquire knowledge from data, identify patterns, and draw conclusions with minimal human intervention. The main categories of ML include supervised learning, unsupervised learning, semisupervised learning, and reinforcement learning. Supervised learning involves training models using labelled datasets and comprises two primary forms: classification and regression. Regression is used for continuous output, while classification is employed
... Show MoreThe importance of the study stems from the fact that it deals with a very important subject, namely, the pivotal role played by E-banking in achieving the competitive advantage of the banking institutions operating in Algeria. By adopting the banking institution and adopting the elements of the electronic marketing mix and developing it as required by the environment The banking system of developments will inevitably be able to achieve excellence from its competitors as each of these elements have an important role in achieving competitive advantage, we relied in this study on studies and research that directly affect the problem of the study and we have put Estep In order to activate the contribution of e-banking in achieving competitiv
... Show MoreBegan research of the foundations of Orientalist discourse based on force and metadata and authority, and the possibility of turning the West's view of the East as if made radical changes in the structure of the West or in a relationship of power and authority between it and the east. We have adopted in our paper on the research categories of Edward Said and visions in the field of Orientalism in general, and especially his book entitled the name of this area, not forgetting, or leave the expansion to other sources, a researcher in this field, to enrich the research.
We went to Orientalism as a concept and based cognitive, and the work of the Orientalist, and the meanings of Orientalism, which suggests Balastala which was c
... Show More