Emails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concept of fuzziness mean, particularly, fuzzy c-means (FCM)
algorithm. Secondly, to show how can the performance of the proposed FCM spam
filtering approach (coined hence after as FSF) be improved. Experimental results on
corpora dataset point out the ability of the proposed FSF when compared with the known
Naïve Bayes filtering technique.
In this paper, some estimators for the unknown shape parameters and reliability function of Basic Gompertz distribution were obtained, such as Maximum likelihood estimator and some Bayesian estimators under Squared log error loss function by using Gamma and Jefferys priors. Monte-Carlo simulation was conducted to compare the performance of all estimates of the shape parameter and Reliability function, based on mean squared errors (MSE) and integrated mean squared errors (IMSE's), respectively. Finally, the discussion is provided to illustrate the results that are summarized in tables.
This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr
... Show MoreThis research id entitled "The Prohibition of Perfidy in International Humanitarian Law". International humanitarian law includes some international agreements that aim to regulate hostilities, and the use of tools and means of warfare (The Hague Law), Where there are many international rules that govern the conduct and management of hostilities, there are some provisions that limit the use of certain means and methods during armed conflict, Whether by prohibiting the use of specific methods of fighting, or prohibiting or restricting the use of certain types of weapons, The dedication of these rules to the law of armed conflict comes in implementation of the principle of the law of war, which restricts the authorit
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free
... Show MoreThe assessment of a river water’ quality is an essential procedure of monitor programs and isused to collect basic environmental data. The management of integrated water resources in asustainable method is also necessary to allow future generations to meet their water needs. Themain objective of this research is to assess the effect of the Diyala River on Tigris River waterquality using Geographic Information System (GIS) technique. Water samples have beencollected monthly from November 2017 to April 2018 from four selected locations in Tigris andDiyala Rivers using the grab sampling method. Fourteen parameters were studied which areTurbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, TotalDissolved Solids,
... Show MoreIn this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.
The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between tw
... Show More