Fuzzy C-means (FCM) is a clustering method used for collecting similar data elements within the group according to specific measurements. Tabu is a heuristic algorithm. In this paper, Probabilistic Tabu Search for FCM implemented to find a global clustering based on the minimum value of the Fuzzy objective function. The experiments designed for different networks, and cluster’s number the results show the best performance based on the comparison that is done between the values of the objective function in the case of using standard FCM and Tabu-FCM, for the average of ten runs.
In current generation of technology, a robust security system is required based on biometric trait such as human gait, which is a smooth biometric feature to understand humans via their taking walks pattern. In this paper, a person is recognized based on his gait's style that is captured from a video motion previously recorded with a digital camera. The video package is handled via more than one phase after splitting it into a successive image (called frames), which are passes through a preprocessing step earlier than classification procedure operation. The pre-processing steps encompass converting each image into a gray image, cast off all undesirable components and ridding it from noise, discover differen
... Show MoreFinding similarities in texts is important in many areas such as information retrieval, automated article scoring, and short answer categorization. Evaluating short answers is not an easy task due to differences in natural language. Methods for calculating the similarity between texts depend on semantic or grammatical aspects. This paper discusses a method for evaluating short answers using semantic networks to represent the typical (correct) answer and students' answers. The semantic network of nodes and relationships represents the text (answers). Moreover, grammatical aspects are found by measuring the similarity of parts of speech between the answers. In addition, finding hierarchical relationships between nodes in netwo
... Show MoreImage classification can be defined as one of the most important tasks in the area of machine learning. Recently, deep neural networks, especially deep convolution networks, have participated greatly in end-to-end learning which reduce need for human designed features in the image recognition like Convolution Neural Network. It is offers the computation models which are made up of several processing layers for learning data representations with several abstraction levels. In this work, a pre-trained deep CNN is utilized according to some parameters like filter size, no of convolution, pooling, fully connected and type of activation function which includes 300 images for training and predict 100 image gender using probability measures. Re
... Show MoreClassification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff
... Show MoreThe recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThis study is designed to detect the level of cytokine IFN-γ concentration, and some antioxidants, including super oxide dismutase (SOD) and Vitamin C, and to estimate the level of sex hormones (FSH and LH), and to determine auto-antibodies (antiphospholipid antibodies (APA) IgG\IgM, and anticardiolipin antibodies (ACA) IgG\IgM) and to estimate the blood parameters in 51 miscarriage women infected with T.gondii distributed depending on the type of antibodies. Additionally, 39 volunteers non-infected with T.gondii included (19 miscarriage women, 10 pregnant women and 10 non-pregnant women). ELISA and spectrophotometer method were used in this study. The results of IFN-γ showed a significant increase)p<0.05) in the l
... Show MoreToxoplasmosis is a parasitic infection that triggers immune cells to produce cytokines and inflammatory mediators that are responsible for abnormal or aborted immune responses. This study highlights the evaluation of the Dectin-1 receptor and cytokine IL-37 in the serum of 80 patients who had miscarried in the first trimester and were infected with toxoplasmosis, as well as 40 pregnant women in the first trimester who had a successful pregnancy (control groups). The serum was first screened for the T. gondii IgM and IgG antibodies by an enzyme-linked immunosorbent assay (ELISA) and then the serum levels of IL-37 and Dectin-1 were determined. The results showed that the serum level of Dectin-1 was significantly increased in anti-
... Show MoreIn this article, we study the notion of closed Rickart modules. A right R-module M is said to be closed Rickart if, for each , is a closed submodule of M. Closed Rickart modules is a proper generalization of Rickart modules. Many properties of closed Rickart modules are investigated. Also, we provide some characterizations of closed Rickart modules. A necessary and sufficient condition is provided to ensure that this property is preserved under direct sums. Several connections between closed Rickart modules and other classes of modules are given. It is shown that every closed Rickart module is -nonsingular module. Examples which delineate this concept and some results are provided.
This study includes isolation, purification, and identification of algae from the canal around Baghdad university Al-jadriah. Four unialgal cultures were obtained. These algal cultures included 3 species of cyanophyta ( Nostoc carneum, Westillopesis prolifica, Chroococcus turgidus), 1 species of chlorophyta (Chlorella vulgaris) . Different plants belonging to different families were collected and extracted for their oils which were Ricinus communis and Sesamum indicum (seeds), Matricaria chamomilla (flowers) .However, antialgal activity of the extracted oils were evaluated the isolated algae with 7 concentrations (0.09, 0.3, 0.5, 1, 10, 20 , 30) % using the agar wells diffusion method. Results showed that R. communis oil was more effecti
... Show More