Background: The figure for the clinical application of computed tomography have been increased significantly in oral and maxillofacial field that supply the dentists with sufficient data enables them to play a main role in screening osteoporosis, therefore Hounsfield units of mandibular computed tomography view used as a main indicator to predict general skeleton osteoporosis and fracture risk factor. Material and Methods: Thirty subjects (7 males &23 females) with a mean age of (60.1) years underwent computed tomographic scanning for different diagnostic assessment in head and neck region. The mandibular bone quality of them were determined through Hounsfield units of CT scan images and were correlated with the bone mineral density values obtained from t-scores of lumbar spine using dual x-ray absorptiometry scans (DEXA). Results: There was a highly signifi¬cant positive correlation [p-value 0.000 (HS)] of bone mineral density that measured by t-score of dual x-ray absorptiometrical scan and Hounsfield units with very strong relation in measuring the bone density (r test) = 0.969, this close relation lead to predict osteoporosity and the chance of fracture occurrence using a statistical equation that classified the patients as osteoporotic. Conclusion: Hounsfield units obtained from computed tomography scans that are made for any purposes can provide an alternative clinical parameter to predict osteoporosis at no additional cost to the patient and no additional radiation.
The aim of the research is to identify the role of public relations in promoting tourism by the Palestinian tourism and travel companies in Gaza from the public relations officer’s point of view in those companies.
The researcher used the descriptive analytical method as the most appropriate for such studies and implemented the questionnaire as a tool to obtain the required data from the respondents.
The Researcher reached several conclusions:
1- There is a low percentage of women working in the field of public relations in Palestinian tourism establishments in the Gaza Strip, where the percentage did not exceed 5%.
2- The interpersonal communication counted as one of the elements of integra
In the mist of developments in the course of scientific research in general and humanities in particular and the accompanying changes in the visions and policies inspired by the need for these sciences to follow the qualitative methods in dealing with many of the topics or problems that require for their solution to obtain qualitative information which can be provided by resorting to quantitative research. Therefore, a new trend has emerged in many public relations› researchers who believe that qualitative research methods should be used by establishing scientific foundations and methodological classification based on the use of these methods and determining the nature of the subjects applied in them to reach results that are character
... Show MoreInternal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito
... Show MoreThis research aims to solve a problem in the field of accounting and financial knowledge in the world today, that is, the problem of creative accounting. Especially after the global financial crisis and the collapse of many large companies in the world, people find that they use creative accounting methods to distinguish them from reality, showing the results of their activities and their financial status. This research discusses the concept of creative accounting, the most important methods used in financial statements and its relationship with external auditing, and procedures to limit accounting creativity. This study uses descriptive analysis methods after confirming its theoretical aspects in practice. Using the statistical
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)