Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in categorical outcomes, with the overarching goal of supervised learning being to enhance models capable of predicting class labels based on input features. This review endeavors to furnish a concise, yet insightful reference manual on machine learning, intertwined with the tapestry of statistical learning theory (SLT), elucidating their symbiotic relationship. It demystifies the foundational concepts of classification, shedding light on the overarching principles that govern it. This panoramic view aims to offer a holistic perspective on classification, serving as a valuable resource for researchers, practitioners, and enthusiasts entering the domains of machine learning, artificial intelligence and statistics, by introducing concepts, methods and differences that lead to enhancing their understanding of classification methods.
People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe research aims to detect the problems of educational reality faced by university professors and identify statistically significant differences in the academic problems of university instructors. It has adopted an analytical descriptive research approach to achieve research objectives and identifies the study community with professors of public and private universities. A random sample of 250 instructors was selected for the purpose of applying the questionnaire to them, knowing the academic problems encountered in the course of their work at universities, and adopting appropriate statistical means to process and analyze the data. The research concluded with a set of results, including that all fields (infrastructure, admission of
... Show MoreIn this research article, an Iterative Decomposition Method is applied to approximate linear and non-linear fractional delay differential equation. The method was used to express the solution of a Fractional delay differential equation in the form of a convergent series of infinite terms which can be effortlessly computable.
The method requires neither discretization nor linearization. Solutions obtained for some test problems using the proposed method were compared with those obtained from some methods and the exact solutions. The outcomes showed the proposed approach is more efficient and correct.
EMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreThe research deals with analyzing the influencing role of trade policies in the growth and development of productive economic sectors and their contribution to GDP and its reflection on workforce employment. Studies have proven the success of the Malaysian experience in stimulating the productive economic sectors to grow and their contribution to the gross domestic product with an increase in the growth of local markets and access to international markets for national products. The research also deals with the ineffectiveness of Iraqi trade policies after 2003 in stimulating the productive economic sectors (agricultural and industrial) on economic growth, as most of the increase in Iraqi GDP growth throughout the study period was
... Show MoreAbstract:
The study focused on the application of smart tourism as one of the applications of electronic commerce in the form of (B2C) to attract tourists to Saudi Arabia, where the tourism sector is one of the important sectors on which the Kingdom depends on the diversity of its economy.
The purpose of the research: With the issuance of tourist visas for the first time the study noted a deterioration in the case of Saudi tourist sites over the Internet, which do not live up to this great interest by the Saudi government for this sector, which became vital to them. The study tried to identify the reality of the Saudi tourist sites through the Internet in order to identify the sui
... Show More