Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Borderline-SMOTE + Imbalanced Ratio(IR), Adaptive Synthetic Sampling (ADASYN) +IR) Algorithm, where the work these techniques are generate the synthetic samples for the minority class to achieve balance between minority and majority classes and then calculate the IR between classes of minority and majority. Experimental results show ImprovedSMOTE algorithm outperform the Borderline-SMOTE + IR and ADASYN + IR algorithms because it achieves a high balance between minority and majority classes.
Background: The purpose of this study was to verify the influence of post- pressing time of acrylic resin (immediate, 6, 12 and 24 hour) on the dimensional accuracy of denture base whish is a critical factor in the retention and stability of the complete denture that may occur during polymerization shrinkage. Materials and Methods: Forty maxillary stone casts were poured in plastic mold (Columbia Dentoform corp. NEW YORK, type III dental stone (Geastone, Zeus Sri Loc.Tamburine Roccastrada, GR, Italy). The stone casts were randomly assigned into 4 groups of 10 specimens each according to the post-pressing times into (immediate, 6, 12 and 24 h.). Heat cure acrylic resin denture base was constructed according to the previously mentioned pressi
... Show MoreObjective(s): The world of dentistry is constantly evolving, and with the advent of 3D printing technology, the possibilities are endless. However, little is known about the effects of adding ZrO2 NPs to the denture base resin of 3D additive manufacturing technique.Aim of this study is to evaluate the behavior of resin which is used to 3D printing of denture base with the addition of ZrO2 NPs on denture adaptation property and diametral compression strength.Methods: 60 samples were printed, 30 disks for diametral compressive test and 30 denture base for denture adaptation test. Three groups per test (n=10). The control group for each test included unreinforced 3Dprinted denture base resin, and the other groups were reinforced with (2&
... Show MoreThe problem of the research is that there is a weakness in speed endurance, which has a direct impact on achievement, as it leads to early fatigue, lack of concentration, and a low level of effectiveness of performance, which made the researchers interested in this problem and finding solutions to it. Hence the importance of the research is evident: preparing cardiorespiratory fitness training to develop speed endurance and rate adaptation. The heartbeat that occurs in runners is a continuous result of training and the use of a type of training that suits the requirements of the 1500-meter running competition. The researchers used the experimental approach with pre- and post-testing for the experimental and control groups. The resea
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreThis research aims to suggest formulas to estimate carry-over effects with two-period change-over design, and then, all other effects in the analysis of variance of this design, and find the efficiency of the two-period change-over design relative to another design (say, completely randomized design).
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.