In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.
Support Vector Machines (SVMs) are supervised learning models used to examine data sets in order to classify or predict dependent variables. SVM is typically used for classification by determining the best hyperplane between two classes. However, working with huge datasets can lead to a number of problems, including time-consuming and inefficient solutions. This research updates the SVM by employing a stochastic gradient descent method. The new approach, the extended stochastic gradient descent SVM (ESGD-SVM), was tested on two simulation datasets. The proposed method was compared with other classification approaches such as logistic regression, naive model, K Nearest Neighbors and Random Forest. The results show that the ESGD-SVM has a
... Show MoreIn this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreIn this paper, a new hybridization of supervised principal component analysis (SPCA) and stochastic gradient descent techniques is proposed, and called as SGD-SPCA, for real large datasets that have a small number of samples in high dimensional space. SGD-SPCA is proposed to become an important tool that can be used to diagnose and treat cancer accurately. When we have large datasets that require many parameters, SGD-SPCA is an excellent method, and it can easily update the parameters when a new observation shows up. Two cancer datasets are used, the first is for Leukemia and the second is for small round blue cell tumors. Also, simulation datasets are used to compare principal component analysis (PCA), SPCA, and SGD-SPCA. The results sh
... Show MoreA new features extraction approach is presented based on mathematical form the modify soil ratio (MSR) and skewness for numerous environmental studies. This approach is involved the investigate on the separation of features using frequency band combination by ratio to estimate the quantity of these features, and it is exhibited a particular aspect to determine the shape of features according to the position of brightness values in a digital scenes, especially when the utilizing the skewness. In this research, the marginal probability density function G(MSR) derivation for the MSR index is corrected, that mentioned in several sources including the source (Aim et al.). This index can be used on original input features space for three diffe
... Show MoreThis study includes determining the climatic conditions and the nature of the reservoirs in the region with the determination of the flow direction of the aquifer. The meteorological data for the Karbala station for the period 1976-2016 showed that the values of the monthly rates of temperature, precipitation, evaporation, relative humidity, wind speed and Sunshine duration are (24.19 C◦), (95.5 mm), (2828.6mm), (46.75%), (2.76 m/sec), and (8.61 h/day) respectively. Thorenthwait method was used to calculate the values of Potential Evapotranspiration (PE) then determine the annual value of WS and WD which equal 28.11mm and 941.94mm respectively. Mean monthly water surplus for the period (1976-2016) was recorded about (9.36mm) in Decembe
... Show MoreA mathematical model has been formulated to predict the influence of high outdoor air temperature on the performance of small scale air - conditioning system using R22 and alternative refrigerants R290, R407C, R410A. All refrigerants were investigated in the cooling mode operation. The mathematical model results have been validated with experimental data extracted from split type air conditioner of 2 TR capacity. This entailed the construction of an experimental test rig which consists of four main parts. They are, the refrigeration system, psychrometric test facility, measuring instrumentation, and auxiliary systems. The conditioned air was maintained at 25 0C dry bulb and 19 0C wet bulb for all tests. The outdoor ambient air temperatur
... Show MoreThe study area of Baghdad region and nearby areas lies within the central part of the Mesopotamia plain. It covers about 5700 Km2. The remote sensing techniques are used in order to produce possible Land Use – Land Cover (LULC) map for Baghdad region and nearby areas depending on Landsat TM satellite image 2007. The classification procedure which was developed by USGS used and followed with field checking in 2010. Land Use-land cover digital map is created depending on maximum likelihood classifications (ML) of TM image using ERDAS 9.2.The LULC raster image is converted to vector structure, using Arc GIS 9.3 Program in order to create a digital LULC map. This study showed it is possible to produce a digital map of LULC and it can be co
... Show More