The aim of the research is to study the comparison between (ARIMA) Auto Regressive Integrated Moving Average and(ANNs) Artificial Neural Networks models and to select the best one for prediction the monthly relative humidity values depending upon the standard errors between estimated and observe values . It has been noted that both can be used for estimation and the best on among is (ANNs) as the values (MAE,RMSE, R2) is )0.036816,0.0466,0.91) respectively for the best formula for model (ARIMA) (6,0,2)(6,0,1) whereas the values of estimates relative to model (ANNs) for the best formula (5,5,1) is (0.0109, 0.0139 ,0.991) respectively. so that model (ANNs) is superior than (ARIMA) in a such evaluation.
The most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student
The present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More