With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). Contrary to the results of experiments conducted on data NSL-KDD with 41 field contact, which affected the rate of detection by changing the radius and the number of the detector as it has been to get the proportion of uncovered between (0.44, 0.824, 0.992) and the percentage of false alarm between (0.5, 0.175, 0.003).
This study aimed to examine the effects of electronic training to improve the skills of designing electronic courses for teachers of Arabic language in the colleges of education in Iraq. The descriptive approach is applied and the sample included 145 teachers of Arabic who were selected randomly from the colleges of education in Iraq. Moreover, the results reflected that e-training is effective in improving the skills related to designing online educational courses for teachers of Arabic in the colleges of education in Iraq. Besides, there was no difference between the mean of the respondents' responses to the total score of the tool on the role of electronic training to develop the skills related to electronic courses designing for teacher
... Show MoreThe present paper aims at finding out the Variance Ratio of Trips Set Out by Scholars of Both Marrouzzeen and Baihaq .The researcher has come up with conclusion including certain findings ,one of which is that the trip is considered an essential base with high effectiveness since the old times and has been evolved .This means that the trip has been the main source of knowledge and sciences from the scholars directly .This had driven the scholars of both Baihaq and Marrouz cities .It has been noticed , though this paper, that the number of the Marrouz scholars who visited was less than those of Baihaq . The researcher has focused on their meetings or conferences and investigated what has been going on in suc
... Show MoreThe present paper aims at finding out the Variance Ratio of Trips Set Out by Scholars of Both Marrouzzeen and Baihaq .The researcher has come up with conclusion including certain findings ,one of which is that the trip is considered an essential base with high effectiveness since the old times and has been evolved .This means that the trip has been the main source of knowledge and sciences from the scholars directly .This had driven the scholars of both Baihaq and Marrouz cities .It has been noticed , though this paper, that the number of the Marrouz scholars who visited was less than those of Baihaq . The researcher has focused on their meetings or conferences and investigated what has been going on in such meetin
... Show MoreQuadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der
... Show MoreRecently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results
... Show MoreAbstract
Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and
... Show MoreThe investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti
... Show More