The dramatic personality represents the most important nerve in the cinematographic discourse due to what it represents of a permanent presence in various types of TV and cinematic stories. That is what makes the cinematographic discourse always seek to introduce the human personality in multiple methods. The psychopathic personality is a type of the personalities that got distinguished presence in the TV and cinematic productions. This is what drew the researcher's attention for the topic of the research for which she used title: structural features of the psychopathic personality in the cinematographic discourse.
The theoretical framework included the research problem which is determined by the following question: what are the structural features of the psychopathic personality in the cinematographic discourse? The researcher, then, determined the importance of the research as well as the research objective and limits. The theoretical framework consists of two sections: the first section: the psychopathic personality, features and types. The second section: the cinematographic structure of the psychopathic personality. The researcher concluded a number of indicators from the theoretical framework. The research procedures included the research methodology, tool, community, analysis unit, and sample. Finally the analysis of the intentional sample represented by the cinema movie (Split). The researcher came up with a set of results from the analysis of the research sample and conclusions
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThis study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe legal text in the language of civil law, constitutional law, language of judges, and legal profession is concerned with a legal language and words that are coherently significant
APDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More