12 results
Search Results
2. لعيب يف تنمية مهارات تصميم قواعد البيانات لدى طالبات الصف الثاين لم إلكرتونية قائمة عىل ال فاعلية بيئة تع لمتع الثانوي ودافعيتهن نحو ال.
- Author
-
سارة بنت نارص احل and إهلام بنت عبدالك
- Subjects
DATABASE design ,INFORMATION technology ,COMPUTER science ,EXPERIMENTAL groups ,DIGITAL learning - Abstract
Copyright of Journal of Educational Sciences is the property of College of Education, King Saud University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
3. The Legal Value of the Artistic Personality of the Robot and its Legal Representative in Intellectual Property Regulations and Provisions -A Comparative Study-.
- Author
-
Mossad, Mohamed Mohamed Elkotb
- Subjects
AESTHETICS ,ARTIFICIAL intelligence ,INTELLECTUAL property ,ROBOTS ,COMPUTER science ,PERSONALITY - Abstract
Information systems are witnessing a massive revolution that has led to rapid and radical changes as new applications of information systems and modern standards for designing these systems have emerged, most notably what is known as artificial intelligence techniques, which is a new field that has emerged as a computer science that is concerned with studying and understanding the nature of human intelligence and simulating it, to create a new generation of Intelligent computers and robots that can be programmed to accomplish many tasks that require a high capacity for deduction and perception. Nowadays, robots are qualified to do multiple jobs. Consequently, it was natural for intellectual property rules and provisions to be affected by the effects of artificial intelligence applications and the new patterns of legal relations that they produced. This requires legislative intervention to harmonize the current legal texts with the changes that have arisen due to the tremendous development in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2022
4. PI-D CONTROLLER BASED ON AN IMPROVED CROW SEARCH ALGORITHM FOR CANCER GROWTH TREATMENT
- Author
-
Mohammed ayad Hussein and Ekhlas H. Karam
- Subjects
Computer science ,pso algorithm ,Cancer ,medicine.disease ,feedback mechanism ,Engineering (General). Civil engineering (General) ,Crow search algorithm ,pi-d control ,icsa ,Control theory ,biotherapy ,medicine ,TA1-2040 ,oncolytic virotherapy ,robust control - Abstract
The number of cancer diagnoses and deaths worldwide is rising every year despite technological advancements in diagnosing and treating multiple forms of cancer. An oncolytic virus is a type of tumor-killing virus that can infect and analyze cancer cells while mostly preserving normal cells. The oncolytic Vesicular-Stomatitis Virus therapeutic's cell cycle-specific action mathematically investigated. An optimal Proportion Integral-Derivative (PI-D) controller is introduced in this paper based on a suggested Improved Crow Search Algorithm (ICSA) to enhance the outcome of oncolytic virotherapy. The control technique was tested in a computer using MATLAB simulation. The suggested ICSA is used to tune the parameters of the PI-D controller. The ICSA used the inertia factor and boundary handle mechanism in the position update equation to balance exploration and exploitation. The simulation results show that decrease in total dose, tumor cells to 30%, the tumor remain in the treatment area from day 30 onwards. Furthermore, the ICSA algorithm outperforms the CSA and PSO algorithms by 34.5497×10-6 and 15.2573 ×10-6, respectively, indicating the robustness of treatment methods that can accomplish tumor reduction through biological parameters ambiguity.
- Published
- 2021
5. Evaluation of Naïve Bayes Classification in Arabic Short Text Classification
- Author
-
Nawar Abbood Fadhil, Mahdi Ahmed Alhakeem, and Mohammed Fadhil Ibrahim
- Subjects
Stop words ,business.industry ,Computer science ,media_common.quotation_subject ,Science ,Feature extraction ,computer.software_genre ,Punctuation ,Field (computer science) ,Naive Bayes classifier ,ComputingMethodologies_PATTERNRECOGNITION ,Scripting language ,Preprocessor ,Artificial intelligence ,arabic text classification, multinomial naïve bayes, complemented naïve bayes, gaussian naïve bayes , tf-idf ,tf–idf ,business ,computer ,Natural language processing ,Earth-Surface Processes ,media_common - Abstract
In the last few years, and due to the vast widespread of social media applications, texts have become more important and get more attention. Since texts, in general, are carrying a lot of information that can be extracted and analyzed. Several researchers have done significant works in text classification. Within different scripts such as English and other western languages, several challenges and obstacles have been addressed with such a field of research. Regarding the Arabic language, the process is different from other vital languages since Arabic is considered an orthographic language that depends on the word shape. It is not easy to apply the standard text preprocessing techniques since it affects the word meaning. This paper evaluates Arabic short text classification using three standard Naïve Bayes classifiers. In our method, we classify the thesis and dissertations using their titles to perform the classification process. The collected dataset is collected from different repositories by using standard scrapping techniques. Our method classifies the document based on their titles to be placed in the desired specialization. Several preprocessing techniques have been applied, such as (punctuation removal, stop words removal, and space vectorization). For feature extraction, we adopt the TF-IDF method. We implemented three types of Naïve Bayes classifiers which are (Multinomial Naïve Bayes, Complemented Naïve Bayes, and Gaussian Naïve Bayes). The study results showed that Complemented Naïve Bayes Classifier proposed the best performance with (0.84) of accuracy for the testing phase. The results of the study are promising to be applied with different short text classifications.
- Published
- 2021
6. Real-Time Monitoring System Based on Li-Fi Network Technology in Healthcare
- Author
-
Ayad Nozad Mohammedtawfiq and Yasser Nozad
- Subjects
Science (General) ,business.industry ,Computer science ,Real-time computing ,Monitoring system ,،,؛e-health shield kit ,Education ,Q1-390 ,،,؛vlc ,Health care ,Li-Fi ,li-fi technology ,business - Abstract
Patients at healthcare facilities require a long-term continuous healthcare monitoring system to keep track of their vital signs. Because it deals with human life, this system must be safe, trustworthy, and ensure that it does not interfere with available radio frequencies or sensitive electronic devices such as MRI (magnetic resonance imaging). This paper introduces a patient monitoring system in intensive care that used Li-Fi technology, designed to help enhance patient care and boost doctor’s clinical results. This robust approach timely collects patient data and integrates securely within the hospital IT framework feeding information to physicians, allowing them to make informed clinical decisions. The system used real-time software which displays the data from different locations for assessment. It was successfully tested in the laboratory. Some measurements are discussed, which compare the received pulses to the modules line of sight (LOS) output channel to correlate the transmitted channels. In this work, experimental analysis and measurements are performed to check the efficiency of the proposed concept.
- Published
- 2021
7. XML Dataset and Benchmarks for Performance Testing of the CLS Labelling Scheme
- Author
-
Alhadi A. Klaib
- Subjects
Scheme (programming language) ,computer.internet_protocol ,Computer science ,Science ,cls labelling scheme ,General Medicine ,computer.software_genre ,xml benchmarks ,CLs upper limits ,ComputingMethodologies_PATTERNRECOGNITION ,Labelling ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Data mining ,computer ,XML ,xml data ,computer.programming_language ,xml datasets ,testing xml labelling schemes - Abstract
Extensible Markup Language (XML) has become a significant technology for transferring data through the world of the Internet. XML labelling schemes are an essential technique used to handle XML data effectively. Labelling XML data is performed by assigning labels to all nodes in that XML document. CLS labelling scheme is a hybrid labelling scheme that was developed to address some limitations of indexing XML data. Moreover, datasets are used to test XML labelling schemes. There are many XML datasets available nowadays. Some of them are from real life datasets and others are from artificial datasets. These datasets and benchmarks are used for testing the XML labelling schemes. This paper discusses and considers these datasets and benchmarks and their specifications in order to determine the most appropriate one for testing the CLS labelling scheme. This research found out that the XMark benchmark is the most appropriate choice for the testing performance of the CLS labelling scheme.
- Published
- 2021
8. PALM CLIPPING AND NONLINEAR COMPANDING TECHNIQUES BASED PAPR REDUCTION IN OFDM-DCSK SYSTEM
- Author
-
Sajjad R. Abdulridha and Fadhil Sahib Hasan
- Subjects
companding techniques ,peak power to average power ratio ,Computer science ,Clipping (signal processing) ,Orthogonal frequency-division multiplexing ,Transmitter ,Function (mathematics) ,Engineering (General). Civil engineering (General) ,Reduction (complexity) ,Bit error rate ,Electronic engineering ,palm clipping ,Inverse function ,differntial chaos shift keying ,orthogonal frequency division multiplexing ,TA1-2040 ,Companding - Abstract
The main drawback of the Orthogonal Frequency Division Multiplexing (OFDM) with Differential Chaos Shift Keying (DCSK) that is named (OFDM-DCSK) is the high Peak to Average Power Ratio (PAPR). In this paper, clipping and companding techniques are suggested to overcome the PAPR problem in the OFDM-DCSK system. For the clipping technique, the clipping function is applied before transmitting the signal without the need for an inverse function at the receiver side. While for companding techniques, the commanding function is applied at the end of the transmitter side and the corresponding decompanding function is applied at the receiver to recover the original signal. Different companding techniques are investigated including Hyperbolic, A-Law, and Mu-Law companding function that are compared with the Palm clipping technique. The MATLAB simulation result shows that the Mu-Law technique has the best PAPR reduction (7.22 dB) with a good bit error rate (BER) performance when the number of subcarriers is equal to 512.
- Published
- 2021
9. ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS
- Author
-
Samir G. Chaloop and Mahmood Z. Abdullah
- Subjects
aes algorithm ,oaep ,business.industry ,Computer science ,Cryptography ,Cloud computing ,security ,hybrid algorithm ,Encryption ,Engineering (General). Civil engineering (General) ,Hybrid algorithm ,rsa algorithm ,Hybrid security ,Information system ,The Internet ,scrypt ,Communication source ,TA1-2040 ,business ,Algorithm - Abstract
Network safety has become an important issue in recent years. Encryption has been developed as a solution and plays an important role in the security of information systems. Many methods are required to secure the shared data. The advanced internet, networking firms, health information and the cloud applications have significantly increased our data every minute. The current work focuses on cryptography to provide the protection for sensitive data that exchanged between personal users, companies, organizations, or in the cloud applications and others during the transfer of data across the network. Firstly, Data sent from sender to network receiver must be encrypted using the cryptographic algorithm. Secondly, the recipient shows the original data using the decryption technique. This paper presents three encrypting algorithms such as AES, RSA and hybrid algorithms, and their efficiency is compared based on the analysis of the time. Results of the experiments show that the hybrid algorithm is better in term of security.
- Published
- 2021
10. Electronic System for Managing Theses of Computer Science College
- Author
-
Dhafar H. Al-Ali and Auday Hashim Saeed Al Wattar
- Subjects
replication ,business.industry ,Computer science ,General Medicine ,QA75.5-76.95 ,dbms ,Replication (computing) ,Electronic computers. Computer science ,QA1-939 ,theses and dissertations ,Software engineering ,business ,electronic management ,Electronic systems ,Mathematics - Abstract
This research paper includes designing and implementing of an Electronic system for managing theses of College of Computer Science and Mathematics, University of Mosul, using replication, C # language and MS SQL Server 2008 databases to be a stable work basis that can be relied upon in the departments’ work as it facilitates the higher administrative bodies in the departments and the deanship Obtaining the required results quickly and accurately, which facilitates and contributes to making the right decisions at the appropriate time and required with the ease of preparing special reports for each student, lecturer and thesis and printing them which it will help the departments head and the scientific committee to complete them if requested, as well as provide various statistics, and to improve administrative efficiency for thesis, the problem of losing thesis data and preserving it from human and natural disasters has been overcome by applying the principle of replication.
- Published
- 2021
11. USING PARTICLE SWARM OPTIMAZATION TO FIND OPTIMAL SIZING OF PV-BS AND DIESEL GENERATOR
- Author
-
Rafid M. Hannun, Abbas Q. Mohammed, and Kassim A. Al-Anbarri
- Subjects
artificial intelligence technique ,particle swarm optimization ,Computer science ,solar energy ,Particle swarm optimization ,Diesel generator ,TA1-2040 ,Engineering (General). Civil engineering (General) ,renewable energy ,Sizing ,Automotive engineering - Abstract
This paper explores the sizing optimization of stand -alone hybrid energy system (HES) in southern Iraq (Thi Qar province) for supply stand-alone households by the electricity. HES consist of three components (solar cell (PV), diesel generator (DG) and battery storage (BS)). Particle swarm optimization (PSO) used in this study for find optimal sizing of the HES to minimizing multi-objective, first objective is to minimizing the total system cost (TSC) that lead to minimizing cost of energy (COE). Second objective is to minimizing total emission CO2 (TECO2). The constraint of the optimization is the reliability (100 %) mean continuous provide the load demand by the electricity. The results of the optimization show the ability the algorithm to minimizing the multi-objective with continuous supply the load by the electricity through life cycle of the project (25) years.
- Published
- 2021
12. The Contemporary Vocal Description of the Vocal Phenomenon in the Holy Quran
- Author
-
Isteitiya, Samir Sharif
- Subjects
الظواهر ,Computer science ,Arabic ,Energy (esotericism) ,القران ,Phonetics ,General Medicine ,language.human_language ,Linguistics ,Fluency ,الاصوات ,الصوتي ,Similarity (psychology) ,language ,Sound pressure ,التوصيف ,Communication channel ,Meaning (linguistics) - Abstract
اتَّبع الباحث المنهج الوصفي المخبري، القائم على ما دلّت عليه مخرجات القياس في المختبر الصوتيّ؛ وذلك لدراسة التفاعل بين اللسانيات – الأصوات خاصة – والدراسات الإسلامية، وأثره الكبير في الوصول إلى آفاق جديدة في فهم الظواهر الصوتية في القرآن الكريم. لقد طُبّقت المفاهيمُ المختلفة في الفروع المتطورة من علم الأصوات على فهم الصوت، من حيث خصائصه النطقية والفيزيائية، وكيف تتصرف الكلمة القرآنية في تطويع الخصائص الفيزيائية للصوت؟ يهدف هذا البحث إلى وصف الظواهر الصوتية الآتية، أولًا: الأسرار العلمية لأصوات الذلاقة في العربية وفي القرآن الكريم، وثانيًا: الخصائص النطقية والفيزيائية للفاصلة القرآنية، مع بيان ارتباط ذلك بالمعنى، وثالثُا: الخصائص النطقية والفيزيائية لأصوات القلقلة، استخدم الباحث واحدة من أدق الأجهزة الصوتية ((CSL في قياس الخصائص النطقية والفيزيائية الآتية: مقدار الطاقة المنتجة للصوت، وكيفية توزيع الطاقة في القناة الصوتيّة، ومقدار ضغط الصوت، واختلاف توزيع هذا الضغط في القناة الصوتيّة، والمماثلة التي تحدث بين الأصوات المتجاورة، وأثر ذلك في التناسق بين النطق والمعنى. This paper studies the interaction between linguistics - voice in particular, and Islamic studies, which a significant impact in better understanding phonetics in the Holy Qur’an using a descriptive and explanatory approach. Various concepts have been applied to understand the phonological and physical properties of the phonemes and how the Quran adapts to the physical properties of the sound. This research aims to describe the following phonetic phenomena; First, the secrets behind the fluency voice in Arabic and the Holy Qur’an, and secondly, the phonological and physical properties of the Qur’anic comma, with an explanation of its connection with the meaning, and third, the phonetic and physical properties of the wording sounds. The researcher used CSL; one of the most accurate acoustic devices, in measuring the following phonological and physical properties; the amount of energy produced for the sound, how the power is distributed in the vocal channel, the amount of sound pressure, the difference in the distribution of this pressure in the said channel, the similarity that occurs between adjacent sounds and the effect of that on coordination between speech and the meaning.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.