Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the improved algorithm can detect this type of anomaly. Thus, our approach is effective in finding abnormalities.
Solid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.
A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.
A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].
The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe
... Show MoreThis study aims to identify the teaching problems that teachers of students with intellectual disabilities face, in addition to exploring the solutions suggested by them in order to overcome such problems or challenges. The researchers used a qualitative approach in order to understand the teachers' perceptions about these problems in a more in-depth way. The interview tools (in-depth and semi-structured interviews) were used to collect data from (3) female teachers from special education programs in the Asir region. The results revealed a number of themes including problems related to students, teachers and the teaching methods they use, curricula, school environment, and school administration. Moreover, the results indicated that famil
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreBacteriocin is an important antimicrobial peptide that can be used in industrial and medical fields due to its characteristics of antibacterial, food preservation and anticancer activities. Fifty isolates of Bacillus sp were collected from different soil samples which were already recognized via morphological and biochemical identification process. The isolates were screened for bacteriocin production effective against Staphylococcus spp in order to select the highest producing isolate. The isolate NK16 showed the maximum bacteriocin production (80 AU/ml) which was further characterized as Bacillus subtilis NK 16 through using API identification system (API 20E and API 50CHB). Then, next step was to detect the optimal conditions for maximum
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreFinding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show More