In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
A hybrid Gas-Enhanced and Downhole Water Sink-Assisted Gravity Drainage (GDWS-AGD) process has been suggested to enhance oil recovery by placing vertical injectors for CO2 at the top of the reservoir with a series of horizontal oil-producing and water-drainage wells located above and below the oil-water contact, respectively. The injected gas builds a gas cap that drives the oil to the (upper) oil-producing wells while the bottom water-drainage wells control water cresting. The hybrid process of GDWS-AGD process has been first developed and tested in vertical wells to minimize water cut in reservoirs with bottom water drive and strong water coning tendencies. The wells were dual-compl
Abstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show More
Background: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreThe aim of this study is to investigate the role of prodigiosin on P. aeruginosa' s biofilm genes involved in the pathogenicity and persistency of the bacteria; Materials and methods: Gram negative bacterial isolates were taken from burn and wounds specimen obtained from some of Baghdad hospitals. Forty six isolates were identified as Pseudomonas aeruginosa and four isolates as Serratia marcescens by using biochemical tests and VITEK 2 compact system. Susceptibility test was performed for all P. aeruginosa isolates, the results showed that 100% were resistant to Amikacin and 98% were sensitive to Meropenem. Resistant isolates were tested for biofilm formation; the strong and moderate isolates (17) were detected by PCR for AlgD gene
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreOne of the most important problems of Iraqi construction projects is the cost variances, so it is important to identify the problems and shortcomings that cause poor cost control. Through the utilization of questionnaires, the study evaluated how project costs were managed and reported. The questionnaire was distributed to 180 professionals working in the Iraqi construction sector, with a response rate of 91%. The results showed that a high percentage of projects are implemented with a difference between real and estimated costs, and the process of documenting cost data needs to be more secure. On the other hand, there is a weakness in providing the necessary work structure information to monitor costs and a lack of proc
... Show More