Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colony algorithm or bees algorithm or a swarm of birds and other originally used algorithm for the purposes of technology pertaining to distinguish between images or signals and others can be illustrated to serve the Census and check successful at it. So the choice fell on the genetic algorithm which often applied in the biology science on the subject of the analysis of DNA and genetic engineering within the modern trends of Medical Science. Proposal genetic algorithm was developed, along with C4.5 algorithm. Having been in this research integrating the work of all these algorithms mechanism Generalized Additive model to estimate some nonparametric function. Simulation was used to demonstrate the classification optimization using misclassification error and prove estimation optimization by the root mean of squares error: RMSE. The simulation has to experiment samples sizes (200, 400, 600) and (1000) replications
The education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity
... Show MoreInundation floodingmap aimedto find outearly warningsto avoidenvironmental damageandhumanin terms of theheight ofthe wave ofwater, speed time arrival, effects of inundation sideanddepth of the water/ distanceand reduce the impact of the flood wave after obtaining the process of collapse of the dam in the lower part of the river to the dam area. The study has been using a numerical model one-dimensional depends on the development of equations (Saint-Venant) so that parts of the river, any river channel main banks of the right and left treated as separate parts, that’s the difference in the characteristics of the hydraulic and engineering, along the line of the flow will take into account in each section of the sections and flow in the riv
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreAbstract:
The main objective of the research is to build an optimal investment portfolio of stocks’ listed at the Iraqi Stock Exchange after employing the multi-objective genetic algorithm within the period of time between 1/1/2006 and 1/6/2018 in the light of closing prices (43) companies after the completion of their data and met the conditions of the inspection, as the literature review has supported the diagnosis of the knowledge gap and the identification of deficiencies in the level of experimentation was the current direction of research was to reflect the aspects of the unseen and untreated by other researchers in particular, the missing data and non-reversed pieces the reality of trading at the level of compani
... Show MoreCervical Uterine Cancer is a disease that explains the vulnerability in which women are in terms of reproductive health with an impact on occupational health and public health, even when in Mexico the prevalence rate is lower than the other member countries of the OECD, its impact on Human Development and Local Development shows the importance that the disease have in communities more than in cities where prevention policies through check-ups and medical examinations seem to curb the trend, but show the lack of opportunities and capacities of health centers in rural areas. To establish the reliability, validity, and correlations between the variables reported in the literature with respect to their weighting in a public hospital. A
... Show MoreJournal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author
... Show MoreThe aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreNowadays, the power plant is changing the power industry from a centralized and vertically integrated form into regional, competitive and functionally separate units. This is done with the future aims of increasing efficiency by better management and better employment of existing equipment and lower price of electricity to all types of customers while retaining a reliable system. This research is aimed to solve the optimal power flow (OPF) problem. The OPF is used to minimize the total generations fuel cost function. Optimal power flow may be single objective or multi objective function. In this thesis, an attempt is made to minimize the objective function with keeping the voltages magnitudes of all load buses, real outp
... Show More