Abstract:
The hotel sector is one of the most vital sectors exposed to risks, and the authorities concerned with control must take their active and influential role in putting the hotel sector on the right track and compatible with the internationally approved approaches, and the importance of auditing the performance of the hotel sector in light of the (Covid-19) pandemic is embodied in the fact that it gives a clear and realistic picture to the management and regulatory bodies about the performance and activities of this sector and the shortcomings and deviations that must be addressed, and also helps government decision makers to ob
... Show MoreThe competitive environment influences the increase in exercise intensity and hence adds to the growth of training and practice. The study objective.to identify the effect of competitive speed exercises on the effectiveness of skill performance and speed of counterattack for junior boxers, as well as to know the rate of development for these variables.Materials and methods. The research sample consisted of twelve up-and-coming Al-Najda Sports Club players who participated in the national tournament and were selected with care. They were placed into two groups, control and experimental, with six boxers each in the control and experimental groups. The two groups were assigned identical weights on purpose, and their ages range from 15 to 16 ye
... Show MoreThe purpose of this research is to highlight the relationship between the administrative investigation and the improvement of institutional performance, and the research sought to achieve a set of cognitive and applied goals. the administrative investigation is the modern trend of managing the offices of the general hginspectors and the main source to build the necessary standards to manage and invest its resources efficiently and effectively required to achieve the goals it seeks. The institutional performance is the cornerstone for the implementation of all tasks and duties carried out by institutions operating within the borders of a particular country, The significant change
... Show MoreThe global rise in temperature and the desert climatic conditions prevalent in Middle Eastern countries have exacerbated rutting distress in heavily trafficked highways. Conventional asphalt binders with a high-temperature performance grade (PG 70) have proven inadequate under such extreme conditions, necessitating the development of modified binders with enhanced high-temperature performance. While polymer modification using styrene-butadiene-styrene (SBS), an elastomeric polymer, and ethylene-vinyl acetate (EVA), a plastomeric polymer, has been widely studied, limited research provides a direct comparison of their effectiveness at both the binder and mixture levels under extremely high-temperature conditions. This study addresses this gap
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show More