Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn this study Microwave and conventional methods have been used to extract and estimate pectin and its degree of esterification from dried grapefruit and orange peels. Acidified solution water with nitric acid in pH (1.5) was used. In conventional method, different temperature degrees for extraction pectin from grape fruit and orange(85 ,90 , 95 and 100?C) for 1 h were used The results showed grapefruit peels contained 12.82, 17.05, 18.47, 15.89% respectively, while the corresponding values were 5.96, 6.74, 7.41 and 8.00 %, respectively in orange peels. In microwave method, times were 90, 100, 110 and 120 seconds. Grapefruit peels contain 13.86, 16.57, 18.69, and 17.87%, respectively, while the corresponding values were of 6.53, 6.68, 7.2
... Show MoreBackground: Because of wide use of Functional Endoscopic Sinus Surgery (FESS) technique in the recent years and basic role of coronal computed tomography (CT) scan in demonstrating the normal drainage route of para-nasal sinuses, identifying the major patterns of inflammatory sinonasal disease and accompanied anatomical variations is essential for appropriate preoperative surgical planning. In review of publisthed literature, there is no data on CT patterns of chronic inflammatory sinonasal disease and their accompained anatomical variations of nose and PNS in our local population.Objectives: was to determine the frequency of CT patterns and variations in patients with sinonasal symptoms.Methods: This was a cross sectional descriptive st
... Show More