The paper starts with the main properties of the class of soft somewhere dense open functions and follows their connections with other types of soft open functions. Then preimages of soft sets with Baire property and images of soft Baire spaces under certain classes of soft functions are discussed. Some examples are presented that support the obtained results. Further properties of somewhere dense open functions related to different types of soft functions are found under some soft topological properties.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract
The analysis of Least Squares: LS is often unsuccessful in the case of outliers in the studied phenomena. OLS will lose their properties and then lose the property of Beast Linear Unbiased Estimator (BLUE), because of the Outliers have a bad effect on the phenomenon. To address this problem, new statistical methods have been developed so that they are not easily affected by outliers. These methods are characterized by robustness or (resistance). The Least Trimmed Squares: LTS method was therefore a good alternative to achieving more feasible results and optimization. However, it is possible to assume weights that take into consideration the location of the outliers in the data and det
... Show MoreOne of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.
The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.
For data compression, where one is trying to find compact transform representations for a
... Show MoreThe study is aimed at social support to the students of the College of Education for women (The research sample) and measuring the quality of life at students of the College of Education for women (The research sample) And to identify the relationship between social support and quality of life of students of the College Education for Women and research sample consisted of 200 students The adoption of the resolution as a tool for data collection and the most important results of the search results that the students of the College Education for Women have social support. In other words, parents and friends are supporting the students. The students have the quality of life any positive meaning to life and that when a person has a quality of
... Show MoreIn this article, the additivity of higher multiplicative mappings, i.e., Jordan mappings, on generalized matrix algebras are studied. Also, the definition of Jordan higher triple product homomorphism is introduced and its additivity on generalized matrix algebras is studied.
This study included the extraction of volatile oils from the leaves of some local Eucalyptus trees (i.e.(1)E.camldulensis ,(2) E.camldulensis , E.microtheca , E.globules , E.sideroxylem , E.krusianin. by the water distillation method. As well as exploring some of their physical properties. The results of this study reveald that the local eucalyptus trees gave a good rate of volatile oil equals to some global kinds and to the rate in India pharmacopeia. Also the results revealed that there had been concurrence between the percentages of volatile oils and refractive index and specific gravity of the plants on which the study was made to study and those included i
... Show More