Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe use of the Iraqi song in the symphony orchestra is one of the pioneering and important works, which carries with it an artistic value of aesthetic specificity in how to use the Iraqi singing heritage. The research aimed to identify the employment of the song (Foug Al-Nakhl) and its works within the Iraqi national symphony orchestra music by the author Hans Count Momer whose works still have a great influence on the authors of the Iraqi orchestra. The researcher presented a brief introduction to the Iraqi Symphony Orchestra, a brief introduction about the author, and the trends of world music towards heritage. He also talked about musical composition, research procedures and tools, and applying the tool to the selected sample (F
... Show MoreBackground: Tooth eruption is a localized process in the jaws which exhibits precise timing and bilateral symmetry. Develop within the jaws and their eruption is a complex infancy process during which they move through bone to their functional positions within the oral cavity. For species with more than one set of teeth, eruption of the second set also accomplishes. The key to the successful clinical management of tooth eruption consists of understanding that this process consists largely of the local regulation of alveolar bone metabolism to produce bone resorption in the direction of eruption and shift and formation of bone at the opposite side.The amniotic sac contains a considerable quantity of stem cells. These amniotic stem cells are
... Show More