Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algorithms have been implemented to unfold the structures of communities, the influence of NMI on the Q, and vice versa, between a detected partition and the correct partition in signed and unsigned networks is unclear. For this reason, in this paper, we investigate the correlation between Q and NMI in signed and unsigned networks. The results show that there is no direct relationship between Q and NMI in both types of networks.
The current study tackles how slavery and racial segregation, which have obviously made an enormous impact in the United States of America for many years, can be defeated through optimism. The study opens with an introduction that clarifies some background about Langston Hughes as a poet who writes against slavery and oppression done to the American Blacks during an era which was known for racial segregation in the United States of America. The poet sheds light , in his poetry, upon the role of African Americans in activating hope and optimism to get freedom which has been reached at the end. The first section of the study analyzes the meaning of slavery and segregation as reflected in some selected poems, showing the oppressive face of
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreIn this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIn this study, chemical oxidation was employed for the synthesis of polypyrrole (PPy) nanofiber. Furthermore, PPy has been subjected to treatment using nanoparticles of neodymium oxide (Nd2O3), which were produced and added in a certain ratio. The inquiry centered on the structural characteristics of the blend of polypyrrole and neodymium oxide after their combination. The investigation utilises X-ray diffraction (XRD), FTIR, and Field Emission Scanning Electron Microscopy (FE-SEM) for PPy, 10%, 30%, and 50% by volume of Nd2O3. According to the electrochemical tests, it has been noted that the nanocomposites exhibit a substantial amount of pseudocapacitive activity.
Naproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende
... Show More There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v
content Analysis for Some Type of Pillows used in Iraqi houses
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show More