This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreStreamlined peristaltic transport patterns, bifurcations of equilibrium points, and effects of an inclined magnetic field and channel are shown in this study. The incompressible fluid has been the subject of the model's investigation. The Reynolds values for evanescence and an infinite wavelength are used to constrain the flow while it is being studied in a slanted channel with a slanted magnetic field. The topologies over their domestic and cosmopolitan bifurcations are investigated for the outcomes, and notion of the dynamical system are employed. The Mathematica software is used to solve the nonlinear autonomous system. The flow is found to have three different flow distributions namely augmented, trapping and backward flow. Outc
... Show MoreThe aim of this study was to compare the effect of conventional implant site preparation technique and a combination of conventional/piezosurgery preparation on implant stability measured at different time intervals, insertion torque, and preparation time. A randomized controlled study was designed, it included 26 patients who received 54 dental implants randomly assigned to 2 groups; in the control group, implants were installed after conventional preparation with drills whereas the study group received implants after mixed conventional/piezosurgery preparation. The outcome variables included: implant stability measured immediately after implant insertion, at 8 weeks and 16 weeks postoperatively, insertion torque and preparation time. All
... Show MoreI attended the new chief base of bilateral interaction Para Amino like 1 Phenyl 4 Bayrosolin 5 Online with Alsalesl Aldehid someone Allicand by careful analysis of the elements and infrared spectrum
Chemical pollution is a very important issue that people suffer from and it often affects the nature of health of society and the future of the health of future generations. Consequently, it must be considered in order to discover suitable models and find descriptions to predict the performance of it in the forthcoming years. Chemical pollution data in Iraq take a great scope and manifold sources and kinds, which brands it as Big Data that need to be studied using novel statistical methods. The research object on using Proposed Nonparametric Procedure NP Method to develop an (OCMT) test procedure to estimate parameters of linear regression model with large size of data (Big Data) which comprises many indicators associated with chemi
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show More