Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of the research is to find out the methods of employing the : Infographics in the news sites due to the different communicative roles of the : Infographics . To achieve the research objective, the researcher used the survey method: the method of analyzing the content to analyze the : Infographics material from the selected sample of the news sites. What was said ? And how was it said? Through the design of a content analysis form that includes a number of studied analysis Infographics of the study.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
شغلت نظرية العدل الإلهي بال الأديب العراقي القديم، مما جعلته يثير عبر نصوصه الأدبية كثير من التساؤلات حول عدالة الإلهة، التي يعبدها ويقدم لها الهدايا وتساؤلاته هذه دفعت بالباحث إلى اختيارها عنوانا لموضوعه، إلا أن الدراسة ستختصر على نصوص معينة، والسبب في ذلك أنها كانت الرائدة في هذا الجانب، وفي اللحظة التي ينتقي فيها العدل الإلهي وتتحول الإلهة إلى كلاب تلهث وراء غرائزها، ذهبنا وراء الأسباب التي قادت إلى فقد
... Show Moreالمرأة نصف المجتمع , وهي التي تلد النصف الاخر وتربيههكذا وصفها الحكماء ولا مسار لارتقاء أي بلد وتقدم أي شعب بدون الارتقاء بالمرأة, وبدون مشاركتها في مسارات التحول والتغيير, لكن المرأة مازالت تعاني من التمييز على أساس النوع , وتتعرض للعنف الجندري مما يشكل عائقا كبيرا امام مشاركتها الحقيقية والفعالة في قيادة دفة الحياة , والأخذ بها نحو عيش حياة طييبة كريمة. تؤكد الوثائق أن العنف القائم على النوع الاجتماعي من الم
... Show MoreAbstract:
In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach
... Show Moreهدفت الدراسة إلى الكشف عن العالقة بين الخبرات الصادمة والسلوك الفوضوي لدى طلبة المرحلة المتوسطة فضال عن التعرف على الفروق بين الطلبة في الخبرات الصادمة والسلوك الفوضوي على وفق متغير النوع )الذكور- اإلناث(، تألفت عينة الدراسة من )185( طالباً وطالبة، وتم تطبيق مقياسا الدراسة على العينة- مقياس الخبرة الصادمة ومقياس السلوك الفوضوي وهما )من إعداد الباحثان(، وقد أسفرت نتائج الدراسة عن: - إن طلبة المرحلة المتوسطة أظهر
... Show More