Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Monetary policy occupies a prominent role in achieving monetary stability by adjusting the growth rates of the number of available means of payment in line with changes in the size of the gross domestic product in the country and expressed by the monetary stability coefficient agreed upon by the International Monetary Fund, a term that hides the fact that there is a rate of change in the volume of commodity or real production which expresses the levels of aggregate supply in the economy, which corresponds to the quantities of cash in circulation, which represent a net purchasing power and stimulate aggregate demand, which completes the picture of the existence of the market mechanism, expressed by the monetary or economic stability
... Show MoreAbstract:
The objective of this study, is to attempt to explain the reality of the Structural Imbalances in the Iraqi Economy during the period of research, by providing a quantitative analysis of the most important types of Imbalances, Which are represented by the disruption in the Productive Structure, the imbalance of the structure of Public Budget, and the imbalance of the Structure of Trade. The problem of the research, is the fact that the economy structure in Iraq has long suffered from an Imbalances in its economic structure, which are represented in the unequal relations between its constituent elements, according to the proportions levels defined by the economic theory.
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show More