Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreCurrently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show MoreOf the new concepts introduced by the decree of the amendment of the French Civil Code No. 131-2016 issued on 10 February 2016, which raised a debate in jurisprudence both at the level of French jurisprudence or the Arab, the concept of (the content of the contract), which seems to have emerged from the appearance of new legal articles ( 1162-1171) is the cornerstone of the contract and the contract in the contract, the two pillars which, over the course of 200 years and a half, have been one of the main pillars of the codification of Napoleon. Is that the decree of amendment has already abandoned these two pillars, or most of what he did is a change in terminology while preserving the content of these two pillars implicitly, this is what w
... Show MoreThe aim of this research is to identify the level of mental mindfulness among female students of the College of Education at Umm Al-Qura University, as well as to identify the statistically significant differences in the level of mental mindfulness according to academic level, specialization, and academic achievement. A mental mindfulness scale was designed to cover five dimensions. The study employed the analytic descriptive approach applied to a random sample of (217) female students from various academic specializations. The findings indicated that the level of mental mindfulness was average among female students. Statistically significant differences were attributable to the academic level, academic specializations, and academic achi
... Show MoreProvisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this
The pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MS
Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u
... Show More