Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.
In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIncreasingly important public opinion polls steadily .... especially in electoral campaigns, sheds searchlight on the side of the US elections, in different time periods, and cited the words of experts and people involved in it, and reviews Find great development that took place in the polls and what could happen to this work It is important in the future. Display search for certain types of polls, dividing them on as stated by the experts in the United States... This division shows that the surveys of the most political processes and accuracy of information, and that their Money being made and companies specialized in the administration of this type of measuring public opinion ..... what is returned decision-making, for example, in conj
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use
... Show MoreThe study aims to identify the extent of the availability of administrative empowerment and the implementation of remote supervision in relation to two variables with respect to the employees of the Saudi Ministry of Education. The study included (456) male and female supervisors. The questionnaire has been administrated to collected data related to the research aims. The results indicated that both the extent of the availability of administrative empowerment and the implementation of remote supervision is of an average degree. There is a significant correlation relationship (p<0.05) between administrative empowerment and remote supervision of the educational supervisors of the Saudi Ministry of Education. The research recommends that
... Show MoreThe research aims to identify the educational plan for the private and public kindergartens. The researchers selected a sample consisted of (59) female teachers for the private kindergartens and (150) female teachers for the public kindergartens in the city of Baghdad. As for the research tool, the two researchers designed a questionnaire to measure the educational plan for the private and public kindergartens. The results revealed that private kindergartens have educational plans that contribute considerably to classroom interaction, the public kindergartens lack for educational plans. In light of the findings of the research, the researchers recommend the following: the need to set up a unified educational plan for the priv
... Show MoreIn present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show More