In this study, the four tests employed for non-linear dependence which is Engle (1982), McLeod &Li (1983), Tsay (1986), and Hinich & Patterson (1995). To test the null hypothesis that the time series is a serially independent and identical distribution process .The linear structure is removed from the data which is represent the sales of State Company for Electrical Industries, through a pre-whitening model, AR (p) model .From The results for tests to the data is not so clear.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe current phase distinguish by the rapid scientific development, which pushes individuals to have the necessities of scientific and practical life through the proper scientific thinking which contribute to the development of invention and creativity away from memorizing and indoctrination and encouraging individuals to looking for information and then attempting to process and develop these information instead of being a passive receiver. The investment of minds becomes the logical investment in all societies by preparing the citizen to become able to face life changes and its necessities. It is very important to take care of individuals and develop their mental abilities and thinking skills. The constructive strateg
... Show MoreAA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
Throughout this paper, three concepts are introduced namely stable semisimple modules, stable t-semisimple modules and strongly stable t-semisimple. Many features co-related with these concepts are presented. Also many connections between these concepts are given. Moreover several relationships between these classes of modules and other co-related classes and other related concepts are introduced.
Abstract
Uncertainty, the deeply-rooted fact that surrounding the investment environment, especially the stock market which just prices have taken a specific trend until they moved to another one for its up or down. This means that the volatility characteristic of financial market requires the rational investor an argument led towards the adoption of planned acts to gain greater benefit in the goal of wealth maximizing. There is no possibility to achieve this goal without the burden of uncertainty and the risk of systematic fluctuations of investment returns in the financial market after the facts of efficient diversification have pro
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show More