This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Arab Islamic environment raises so many issues and problems.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
This research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreProvides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin
... Show MoreAbsitract
This research was interested in studying the phrase “I don’t know” in the Lisan al-Arab dictionary, and Lisan al-Arab was based on collecting its material from five dictionaries, including: Tahdhib al-Lugha, al-Muqamah, al-Sahih, and the footnotes of Ibn Berri, al-Nihaya and Gharib al-Hadith. The objection to this phrase, and the discussion of its various implications among linguists and the clarification of the closest and most famous content to it according to the data presented to the researcher in his research journey, and to reach this goal, the research division into a preface, five demands and a conclusion and followed the list of sources and references. To define the lexicon of Lisan al-Ar
... Show MoreThis study is qualitative, it illustrates H.G. Wells\\'s The Time Machine through the scientific and social framework of the Victorian Era. Wells\\'s portrayal of future societies examines the rapid technological progress and social changes of the 19th century. The analysis scrutinizes the division between the Eloi and the Morlocks, tracing the consequences of social division. To meet the objective of the study, Victorian frame of mind is utilized to examine the class struggle that is symbolized by the Eloi and the Morlocks. The analysis highlights the economic and social effects of industrialization and how Wells examines the capitalist system and its impact on human relationships and class division. The study also utilizes concepts from D
... Show MoreIn the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreThe objective of the research is to shed light on the nature of the impact of the activities of the national strategy for poverty alleviation in achieving the goals of sustainable development, and the research problem was represented by Is there an effect of the activities of the national strategy for poverty reduction in achieving the goals of sustainable development? and represents the field of research in the Ministry of Labor and Social Affairs For the years (2012-2016) and the results of the sustainable development goals indicators for the years (2012-2016), the ready-made statistical program (SPSS ver.10) was used to calculate the percentages, multiple linear regression equation, the F test and the R2 coefficient, and the research
... Show MoreABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show More