The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
The current research is concerned with studying the decisive answers which are considered quick and conclusive. These answers can effectively interrupt the opponent's argument and close the dialogue.This research is concentrated on deliberative methodology focusing on the decisive answer's activity and ending them through several completing and argument sides. This research consists of an introduction and three parts, the current introduction is focused the light on the concept of decisive answers and its uses in literature and the scarce of speech, and how to consider it with one dialogue description,that dialogue constitute by ? The first part is concerned with those answers through the deliberative methodology and classifying decisive
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
The current study aimed to review previous scholarly efforts to understand the concept of sustainable development, its practices, and its significance for public institutions. The study focuses on the dimensions of sustainable development—environmental, social, and economic—within public institutions. Sustainable development allows these institutions to balance environmental protection, economic growth, and social justice, ensuring the prosperity of both current and future generations. Furthermore, sustainable development is crucial for maintaining organizational performance. The review bridges knowledge gaps related to sustainable development and utilizes an analytical approach, surveying previous studies on the topic. The sele
... Show Moreيهتم هذا البحث بدراسة الأجوبة المسكتة,وهي أجوبة سريعة وحاسمة تقطع حجة الخصم وتفحمه وتغلقالحوار.وقد أرتكز البحث على منهجية تداولية تنظرإلى فاعلية الجواب المسكت في المحاورة وإنهائها من زواياإنجازية و حجاجية.وقد تكون البحث من ديباجة ممهدةوثلاثة مباحث.وسلطتالديباجةالممهدةالضوء علىمفهومالجواب المسكتوشيوعهفي كتب الأدبوالأخبارونوادر الكلاموكيف يمكن النظر لهبوصفه وحدة حوارية تنبنيمنها المحادثة؟أما المبحث ا
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreMaxillofacial trauma in females is not widely reported. This study aimed to analyze the clinical characteristics and the patterns of maxillofacial injuries in females and to determine the differences in these patterns among different causes. This retrospective study analyzed several variables, including demographic, social, injury-related, and treatment-related variables, and compared these variables in relation to the main etiologies of maxillofacial trauma. The main etiologies of maxillofacial injuries involving females were assault, followed by road traffic accidents, and falls. There were significant differences in relation to the 3 etiologies in age groups (