The objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe marshes are one of the important environmental features affecting human and animal systems, so the studying of changes they undergo is one of the important topics. This study is concerned with the changes occurring in the Al Saadya marsh for the period from 1987 to 2017 exclusively in the winter season (the marshes’ revival season in Iraq revive). In order to inspect the changes in this marsh, we choose 7 years to cover the study period as a criterion years, namely 1987, 1990, 1995, 2000, 2007, 2014 and 2017. The “Maximum Likelihood” classifier was used to separate the stacked land cover features, where the minimum overall accuracy ratio that recorded for all years of study was 96%. The results revealed that Al-Saadya marsh went t
... Show MoreIn this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Water balance approaches are strategies for resolving key theoretical and practical hydrological issues. The major goals of this study are to examine climatic elements and conditions to calculate groundwater recharge using the water balance approach. The study area is located in Mandaly city, Diyala Governorate, eastern Iraq. The metrological data was gathered between 1994 and 2020 to evaluate the study area's climate. The annual rainfall rate has been 248.61 mm, with a relative humidity of 43.89%, a temperature of 24.41 oC, a wind speed of 1.99 m/sec, sunshine of 8.32 hours per day, and evaporation of (268.09 mm). The total amount of corrected evapotranspiration was 1010.09 mm, with a peak value of 225.29 mm in Jul
... Show MoreIn this paper, a new hybridization of supervised principal component analysis (SPCA) and stochastic gradient descent techniques is proposed, and called as SGD-SPCA, for real large datasets that have a small number of samples in high dimensional space. SGD-SPCA is proposed to become an important tool that can be used to diagnose and treat cancer accurately. When we have large datasets that require many parameters, SGD-SPCA is an excellent method, and it can easily update the parameters when a new observation shows up. Two cancer datasets are used, the first is for Leukemia and the second is for small round blue cell tumors. Also, simulation datasets are used to compare principal component analysis (PCA), SPCA, and SGD-SPCA. The results sh
... Show MoreThis study includes determining the climatic conditions and the nature of the reservoirs in the region with the determination of the flow direction of the aquifer. The meteorological data for the Karbala station for the period 1976-2016 showed that the values of the monthly rates of temperature, precipitation, evaporation, relative humidity, wind speed and Sunshine duration are (24.19 C◦), (95.5 mm), (2828.6mm), (46.75%), (2.76 m/sec), and (8.61 h/day) respectively. Thorenthwait method was used to calculate the values of Potential Evapotranspiration (PE) then determine the annual value of WS and WD which equal 28.11mm and 941.94mm respectively. Mean monthly water surplus for the period (1976-2016) was recorded about (9.36mm) in Decembe
... Show MoreHemorrhagic insult is a major source of morbidity and mortality in both adults and newborn babies in the developed countries. The mechanisms underlying the non-traumatic rupture of cerebral vessels are not fully clear, but there is strong evidence that stress, which is associated with an increase in arterial blood pressure, plays a crucial role in the development of acute intracranial hemorrhage (ICH), and alterations in cerebral blood flow (CBF) may contribute to the pathogenesis of ICH. The problem is that there are no effective diagnostic methods that allow for a prognosis of risk to be made for the development of ICH. Therefore, quantitative assessment of CBF may significantly advance the underst
Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n  ï€* , to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.