Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThis paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f
... Show MoreTo deduct the childhood status in Iraq, it was important manner to use statistical tools and approaches concerned with interpreting the causal relationships and their attitudes and use classification method for the important effects (variables) to draw an obvious picture of the phenomena under study in order to make it useful through investing, updating and improving it in by demographic studies in the future. Two statistical methods had been used in the field of analyzing data of multivariate analysis namely, Cluster Analysis and Factor Analysis.
The present study focuses on four fundamental axes .The nutrition axis, health axis, Educational axis, and the social axis. The study has ca
... Show MoreThe physical sports sector in Iraq suffers from the problem of achieving sports achievements in individual and team games in various Asian and international competitions, for many reasons, including the lack of exploitation of modern, accurate and flexible technologies and means, especially in the field of information technology, especially the technology of artificial neural networks. The main goal of this study is to build an intelligent mathematical model to predict sport achievement in pole vaulting for men, the methodology of the research included the use of five variables as inputs to the neural network, which are Avarage of Speed (m/sec in Before distance 05 meters latest and Distance 05 meters latest, The maximum speed achieved in t
... Show Moreבמחקר הזה ניתחנו מספר נאומים של שמעון פרס, אנחנו התמקדנו בהשפעה והשכנוע אצל שמעון פרס ואיך הוא יכול להעביר את המסרים של נאומיו בסגנון פרגמטי כדי להגיע ללבו של הציבור.
גם כן, התמקדנו בסגנון הפוליטי שהוא חושב כי התחום הזה צריך להיות ברור מול הציבור וגם כן מול דעת הקהל הבינלאומי מתוך השימוש במונחים בעלי השפעה ושכנוע להגיע למטרות המבוקשות.
במלים אחרות, שמעון פרס, לעתים, מתמקד בשפה מליצית ויעמוד הרב
... Show MoreThe research aims to measure the extent of the impact of Earnings quality in the continuity of the company for a sample of private commercial banks listed on the Iraq Stock Exchange. The research sample included (15) of the listed commercial banks that continue to issue their financial statements for the period from (2009-2018).The research relied on three main models of measurement and on four steps. The first step is to measure the Persistence (Earnings Quality) by Depending the sustainability model. While the second step included measuring the Predictability of accounting profits by deriving the square root of the disparity of the estimation error from the first model Persistence (Earnings Quality), and the third step included
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe paper presents the results of the research on the influence of the adjuvant concentration on the size of the drops produced by the spray nozzles of agricultural sprayers. For the tests, adjuvant Normaton with the composition of total nitrogen, amide nitrogen (N-NH2) and phosphorus pentoxide (P2O5) was used. The adjuvant was added to the water taken from the municipal water supply system of the city of Lublin. The tests were carried out for three concentrations, i.e. 75%, 100%, and 125% of the adjuvant concentration recommended by the manufacturer, and water without the adjuvant. The surface tension of water with adjuva