With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
This research seeks to identify the dimensions of the development of staff performance (training ', incentives, management skills) and its impact on the settlement of compensatory claims adopted in the current research in the Iraqi insurance company،This research aims to highlight the role of developing insurance company’s workers’ performance in settling insurance compensation, and to check this process, the research was applied in the general Iraqi insurance company as it considered as the research community, and a sample was taken from this community that represented by company’s insurance department workers or by collecting actual data that is related to the research’s sample, in addition to the financial compensation data.<
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Big data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show MoreThe field experiment was conducted with the aim of developing and testing an automatic sprayer for agricultural spray experiments and studying the effect of spray pressure, spray speed and spray height on the spraying process. The effects of the major spraying factors (pressure, speed, and height) on the spraying performance of the automatic sprayer were studied. This study included several traits: First - the drop sizes - Second - the penetration of the spray into the vegetation cover - Third, the spray wasted. The results showed: - First: - Increase in coverage percentage when using the first speed, 2 km / h, which amounted to 26.85%. An increment in the spraying penetration of the vegetation cover was observed at the second speed
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreBackground: The gene responsible for encoding the protein of cytotoxic T lymphocyte-associated antigen-4 (CTLA-4) has been found to be associated with rheumatoid arthritis (RA) in different ethnic populations. But the association of +49A/G CTLA-4 polymorphism with susceptibility of RA among Iraqi Arab populations has not yet been determined. Methods: One hundred and seventy-eight patients were examined, 67 of them were males (mean age 54.71 ± 10.4 years), while 167 were examined for the control group, of whom 64 were males and the rest were females. CTLA-4 DNA genotyping was carried on to determine the +49 A/G (rs231775) polymorphism using a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP). Enzyme-linked immuno
... Show More