The study seeks to examine the level of personal efficacy and its relation to mental alertness among university students. Besides, the statistically significant differences in regard of students' gender, and the correlation between male and female. To do this, the researcher adopted two scales: one to measure the personal efficacy which was made up by (abed al-jabaar, 2010) included (26) items, and the other to measure the mental alertness that designed by (abed Allah, 2012) included (36) items. A total of (120) student were selected randomly from three-different colleges at the Al-Mustansiriyah University for the academic year 2016-2017. The findings revealed there are no significant differences among students in regard of the personal
... Show MoreThe paper delves into the examination of trauma portrayals in Heather Raffo's “Noura” (2019). Raffo examines the challenges faced by two Iraqi women, Raffo and Maryam, in relation to parenthood following the capture of Iraq by “ISIS”. The paper is concerned with the various depictions of trauma that Raffo accomplishes in the text then delves in the way she cocooned her characters’ identity in order to recover their traumas. Initially, Noura is a trauma tale, illustrating the recurrent and repetitive nature of trauma from mother to daughter. The narrative reflects the interactions and dynamics between the mother and daughter and their function as substitutes for memory and recounting personal narratives. Moreover, examin
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThis paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n
... Show MoreThe subject of marketing culture and mental image is one of the important topics in the field of management. There is no study that combines these two variables. The research is important because of the increasing importance of the subject. The future direction of the company in question will support the company's economic and marketing responsibilities. And reflect the company's mental image, as a culture that contributes to changing the reality of the organization investigated by polling the views of a sample of managers in the General Company for Vegetable Oil Industry, which (30) out of the (65) individual, and There are two hypotheses of research: There is a significant
... Show MoreThe segmentation of aerial images using different clustering techniques offers valuable insights into interpreting and analyzing such images. By partitioning the images into meaningful regions, clustering techniques help identify and differentiate various objects and areas of interest, facilitating various applications, including urban planning, environmental monitoring, and disaster management. This paper aims to segment color aerial images to provide a means of organizing and understanding the visual information contained within the image for various applications and research purposes. It is also important to look into and compare the basic workings of three popular clustering algorithms: K-Medoids, Fuzzy C-Mean (FCM), and Gaussia
... Show MoreThis research aims to reveal the quality standards available in press images published in the news sites, the Iraqi News Agency and Al-Mada Press for the period from: 1/9/2019, to: 30/9/2019. The research is a descriptive research, in which the researcher relied on the survey methodology to achieve its objectives. The research reached a number of results, most notably the weak role of photojournalists in the websites and the adoption of those the Internet as a source for obtaining press images published with news and reports through its pages, as well as the neglect of the standard Description/Comment below the press images, which plays an important function in explaining and interpreting them for users.
Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More