The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThis study was aimed to explore the impact of social concepts about tribe, clan and women, on internal audit performance. These concepts are considered to be components of the organizational culture and performance of internal audit practice, with respect to the individual and collective performance within the institution. The study, furthermore, was intended to investigate and understand the role of the organizational culture of the tribal, clan and women components with regard to their role in society, in Qatar.
To achieve these objectives, the researcher followed the descriptive analytical approach, using a questionnaire directed to experts and staff working in the banking sector, with the view to test
... Show MoreAbstract
It is clear to everyone how important it is to implement transactions electronically, as it facilitates the provision of services to beneficiaries, whether individuals or institutions, to achieve many benefits that are not exclusive to the beneficiary or the applicant, but extends to the governmental and international bodies. And the number of users has reached millions since its emergence in 1995, because the concepts of electronic transactions have great advantages for the economy in general and the banking sector in particular, so cooperation in various fields with the aim of becoming an information society has become paramount, It allows customers to pay money to any company they want t
... Show MoreAbstract: As human history is implicated in landscape or the natural history, it can be stated that the origins of the Caribbean writers' conflict, in general, are the colonial history of West India. That history which tells the story behind not only their fragmented identity, but also the problems connected to their language as well. Building on the arguments of the prominent Postcolonial ecoccritics such as Elizabeth DeLoughrey, George Handley, Helen Tiffin, and Graham Huggan, this research analyzes selected poems by Derek Walcott's which are bounded in his volume, Collected Poems. It shows how the Caribbean history has been erased due to the brutality of colonization offering landscape as a reliable source which has recorded that history
... Show MoreThe anatomic characteristics of the leaves of 22 taxa of Stachys L. representing seven of the currently recognized sections distributed in northern Iraq, were examined. The study did not found any variations in the characteristics of the stomata system of the leaves.Therewere variations with a good taxonomic value in other anatomic characteristics.Thevariations in characters of the mesophyll tissue in S.kurdica var.brevidens Bom ex Bhattacharjeewas bifacial but in S.kurdica var.kurdica Boiss. & Hohen.was unifacial .The study also found that the taxa S.benthamiana Bioss., S.lanigera (Bornm.) Rech.f. andS.kotscyi Bioss. with 3 vascular bundles in the middle vein while the taxa S.ballotiformis Vatke., S.megalodonta Hausskn. &Bo
... Show MoreBackground: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for t
... Show MoreThe anatomic characteristics of the leaves of 22 taxa of Stachys L. representing seven of the currently recognized sections distributed in northern Iraq, were examined. The study did not found any variations in the characteristics of the stomata system of the leaves.Therewere variations with a good taxonomic value in other anatomic characteristics.Thevariations in characters of the mesophyll tissue in S.kurdica var.brevidens Bom ex Bhattacharjeewas bifacial but in S.kurdica var.kurdica Boiss. & Hohen.was unifacial .The study also found that the taxa S.benthamiana Bioss., S.lanigera (Bornm.) Rech.f. andS.kotscyi Bioss. with 3 vascular bundles in the middle vein while the taxa S.ballotiformis Vatke., S.megalodonta Hausskn. &Bornm.exP.H.Davis
... Show More