Mindfulness is considered a process to draw an image of the active event and to creat new social varieties which leaves the individuals open to modernity and to be sensitive towards the context. in contrast, when individuals act with less attention, they need to be more determined concerning the varieties and events of the past . and as a result , they become unaware of the characteristics that creat the individual condition .The problem of the current study is represented in asking about the nature of the possible relationship between mindfulness and self-regulated learning within specific demographic frame of an importantsocial category represented in university students where no previous researches nor theories have agreed on the natu
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThis work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreFibromuscular dysplasia (FMD) is a noninflammatory and nonatherosclerotic arteriopathy that is characterized by irregular cellular proliferation and deformed construction of the arterial wall that causes segmentation, constriction, or aneurysm in the intermediate-sized arteries. The incidence of FMD is 0.42–3.4%, and the unilateral occurrence is even rarer. Herein, we report a rare case of a localized extracranial carotid unilateral FMD associated with recurrent transient ischemic attacks (TIAs) treated by extracranial-intracranial bypass for indirect revascularization. The specific localization of the disease rendered our case unique.
The esterification reaction of ethyl alcohol and acetic acid catalyzed by the ion exchange resin, Amberlyst 15, was investigated. The experimental study was implemented in an isothermal batch reactor. Catalyst loading, initial molar ratio, mixing time and temperature as being the most effective parameters, were extensively studied and discussed. A maximum final conversion of 75% was obtained at 70°C, acid to ethyl alcohol mole ratio of 1/2 and 10 g catalyst loading. Kinetic of the reaction was correlated with Langmuir-Hanshelwood model (LHM). The total rate constant and the adsorption equilibrium of water as a function of the temperature was calculated. The activation energies were found to be as 113876.9 and -49474.95 KJ per Kmol of ac
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More