In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreThis study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show MoreAbstract:
The research aims to identify how to audit potential liabilities and contingent liabilities in light of the pandemic and its reflection on the auditor's report. The research problem is represented by the complexity of the process of checking potential liabilities and contingent liabilities in insurance companies, which was negatively reflected in the auditor's neutral technical opinion. The researchers hypothesize that auditing potential liabilities and contingent liabilities in light of the Corona pandemic is positively reflected in the auditor's report. The research concludes that the process of checking potential liabilities and contingent liabilities is
... Show MoreSummary of the discussion of the jurisprudential aspects of Imam Abu Al-Fayyad Al-Basri, and their impact on the Shafi’i school, on the provisions of transactions, personal status, janaabah, limits, and others
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, our master Muhammad, and upon his pure family, and his ignorant and ignorant companions, and those who followed them in goodness until the Day of Judgment.
Then:
The many jurisprudential aspects that the Shafi’i imams said are of great importance, because these aspects are nothing but the opinions of venerable jurists who have reached a high degree of knowledge unti
... Show MoreAccounting disclosure is the main means and effective tool for communicating business results to users in support of their decisions, especially those with thought and specialization from academics and professionals in the field of accounting and auditing about the importance of accounting disclosure and transparency in financial reports.
Contingent liabilities represent commitments based on the occurrence of one or more events in the future to confirm the value due, the party entitled to it, the maturity date, or to confirm the existence of the obligation itself, and therefore they should not be recognized as a contingent liability i
... Show MoreDerivational word formation process is one of the most substantial linguistic procedures that solves many problems in the translation of the language new vocabulary and helps to comprehend the smallest language component that not simply semantically and structurally explain the elements of both Russian and Arabic but also enables translators to comprehend the derivational method procedures of both languages. It also reveals the structural aspects of translation equivalences, cognitive and semantic foundations of translation. The rapid development of languages and the appearance of a new vocabulary like ṭabaʿa "print → ṭābiʿat "printer", kataba "to write" → kātib → kātibat, rafaʿa "to raise" → rāfiʿat "a crane" d
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More