This research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of prevention and the presentation of a topic is the talk of the hour as presented the nature of policies based on interests and reconsider the issue of human rights in the light of the changes taking place and rapid developments in the world. The first section deals with the conflict of identities , the second is the struggle of ideologies, then the conclusion and the list of sources.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreIn this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.
The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreElectronic Commerce (EC) is an important field due to the many advantages it involves. This study aims to discuss the constraints surrounding educated Iraqi women which results overall lack of entering the EC and to give us additional insight into why they are avoiding entering this world. Results reveal that lack of awareness, lack of government policy and support, language, security and trust are the most important factors that contributes to EC adoption in addition to many other factors
The aim of this study is to assess the influence of some risks factors on the fistula development after palatoplasty to improve the outcome of the patients
A total of 48 patients (the males were 22, The females were 26) were included in this study. All the patients were examined weekly for the first month postoperatively to assess any breakdown in the wound by inspection and by asking the parents for any nasal regurgitation during fluids feeding.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreWith the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreThis research was aimed to study the efficiency of microfiltration membranes for the treatment of oily wastewater and the factors affecting the performance of the microfiltration membranes experimental work were includes operating the microfiltration process using polypropylene membrane (1 micron) and ceramic membrane (0.5 micron) constructed as candle; two methods of operation were examined: dead end and cross flow. The oil emulsion was prepared using two types of oils: vegetable oil and motor oil (classic oil 20W-50). The operating parameters studied are: feed oil concentration 50 – 800 mg/l, feed flow rate 10 – 40 l/h, and temperature 30 – 50 oC, for dead end and cross flow microfiltration.
It was found that water flux decrea