This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estimation through working with rough set theory. The results obtained from most code sets show that Bees algorithm better than ID3 in decreasing the number of extracted rules without affecting the accuracy and increasing the accuracy ratio of null values estimation, especially when the number of null values is increasing
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe galvanic corrosion of the (Cu - Fe), (Cu - Zn) and (Fe - Zn) couples have been investigated in 3.5% NaCl solution, 40ºC, different velocities (Re = 5000, 10000 and 15000) and different area ratio’s of cathode to anode (AR= 0.5,1 and 2), by using commercial metal pipe (cylindrical tube).The Zero Resistance Ammeter has been used to measure the galvanic current (Ig) and galvanic potential (Eg) with time. The galvanic current density increases with increasing velocity (Re) and the area ratio (AR). The galvanic potential (Eg) is shifted to less negative with increasing velocity (Re) and the area ratio (AR). A statistical relations for the galvanic current density and galvanic potential as a function of (Re). and the area ratio had been
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreThe research illustrated that the theory of constraints is "A group of concepts and basics that aim at helping the management in order to determine the difficulties and how to overcome these difficulties through determining the necessary change and how these change can be done efficiently and effectively ".
The research showed that the theory of constraint including its tools calls for magnifying throughput, constricting the product cycle , determining the optimal production mix , utilization of scare resources and canceling the idle time , that achieving throughput increasing then increasing profit .
Moreov
... Show MoreThe UN plans to achieve several development objectives by 2030. These objectives address global warming, a major issue. This method aims to improve sustainable accounting performance (AP). In this circumstance, AI is being applied in various fields, notably in economic, social, and environmental (ESE) domains. This research investigates how sustainable development (SD) influences AI methodologies and AP improvement. The research examined a sample of Iraqi banks listed on the Iraq Stock Exchange from 2014 to 2022. AI was measured by ATM and POS prevalence. A three-dimensional approach examined economic, social, and environmental (ESE) sustainability. Meanwhile, the performance of sustainable accounting was measured through the return on asse
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe adsorption behavior of congo red dye from its aqueous solutions was investigated onto natural and modified bauxite clays. Both bauxite and modified bauxite are primarily characterized by using, FTIR, SEM, AFM, and XRD. Several variables are studied as a function of adsorption including contact time, adsorbent weight, pH, ionic strength, particle size and temperature under batch adsorption technique. The absorbance of the solution before and after adsorption was measured spectrophotometrically. The equilibrium data fit with Langmuir model of adsorption and the linear regression coefficient R2 is found to be 0.9832 and 0.9630 for natural and modified bauxite respectively at 37.5°C which elucidate the best fitting isotherm model. The gene
... Show MoreHeavy metal consider as major environmental pollutants. Many of industrial wastewater effluents contain a wide range of these heavy metals. The adsorption of Cd2+ and Pb2+ metal ions from aqueous solution by activated carbon was studied. The results showed that maximum adsorption capacity occurred at 486.9×10-3 mg/kg for Pb2+ ion and 548.8×10-3 mg/kg for Cd2+ ion. The adsorption in a mixture of the metal ions had a balancing effect on the adsorption capacity of the activated carbon. The adsorption capacity of each metal ion was affected by the presence of other metal ions rather than its presence individually. The study showed the presence of other heavy metals attribute to the reduction in the activated carbon capacity, and the adsorp
... Show MoreThis study aims to examine the relationship between emotional intelligence and academic adaptation among a sample of gifted students in intermediate and high schools in Jeddah, Saudi Arabia. The study also seeks to examine the differences between group means in emotional intelligence and academic adaptation due to demographic variables (gender and school level). In addition, the study aims to examine the role of emotional intelligence in predicting the level of academic adaptation. The researcher performed the descriptive, correlational, predictive, and comparative approaches to collect the data from a sample comprised of (309) gifted students using the emotional intelligence scale developed by Bar-on (2000), whi
... Show More