String matching is seen as one of the essential problems in computer science. A variety of computer applications provide the string matching service for their end users. The remarkable boost in the number of data that is created and kept by modern computational devices influences researchers to obtain even more powerful methods for coping with this problem. In this research, the Quick Search string matching algorithm are adopted to be implemented under the multi-core environment using OpenMP directive which can be employed to reduce the overall execution time of the program. English text, Proteins and DNA data types are utilized to examine the effect of parallelization and implementation of Quick Search string matching algorithm on multi-core based environment. Experimental outcomes reveal that the overall performance of the mentioned string matching algorithm has been improved, and the improvement in the execution time which has been obtained is considerable enough to recommend the multi-core environment as the suitable platform for parallelizing the Quick Search string matching algorithm.
In this article we study the variance estimator for the normal distribution when the mean is un known depend of the cumulative function between unbiased estimator and Bays estimator for the variance of normal distribution which is used include Double Stage Shrunken estimator to obtain higher efficiency for the variance estimator of normal distribution when the mean is unknown by using small volume equal volume of two sample .
The subject of youth care of important issues in view of what constitutes the importance
to the development of societies in general and as much as enjoy young people in any society
are good psychological health and agree psychosocial be healthy to be effective to invest their
energies and their potential for the progress of that society and development of the social
aspects and economic. The universities of the most important educational institutions that
provide care for young people, they are as well as providing information and expertise
necessary to prepare young people for life and the development of mental abilities, they are
different activities that will satisfy their needs physical, psychological, social and
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: This study was conducted to evaluate the hard palate bone density and thickness during 3rd and 4th decades and their relationships with body mass index (BMI) and compositions, to allow more accurate mini-implant placement. Materials and method: Computed tomographic (CT) images were obtained for 60 patients (30 males and 30 females) with age range 20-39 years. The hard palate bone density and thickness were measured at 20 sites at the intersection of five anterioposterior and four mediolateral reference lines with 6 and 3 mm intervals from incisive foramen and mid-palatal suture respectively. Diagnostic scale operates according to the bioelectric impedance analysis principle was used to measure body weight; percentages of body fa
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three
... Show MoreA new, simple, sensitive and fast developed method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation a burgundy color complex between methyldopa andammonium ceric (IV) nitrate in aqueous medium using long distance chasing photometer NAG-ADF-300-2. The linear range for calibration graph was 0.05-8.3 mmol/L for cell A and 0.1-8.5 mmol/L for cell B, and LOD 952.8000 ng /200 µL for cell A and 3.3348 µg /200 µL for cell B respectively with correlation coefficient (r) 0.9994 for cell A and 0.9991 for cell B, RSD % was lower than 1 % for n=8. The results were compared with classical method UV-Spectrophotometric at λ max=280 n
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show More