In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
The industrial production sector has an important role in the national economy of the advanced countries as well as the developing ones to get higher levels for their economy . We in Iraq , just like most of the develpoing countries , our economy still suffers of great shortage in this active sector in spite of the repeated statements about the desire of activating the contribution of this sector in the national economy . The industrial sector in Iraq suffers in general of many problems , especially the public industrial sector (manufacturing) . These problems have been existed because of the unnatural conditions that Iraq has passed during the previous decades especially in the political and security sides . which reflecte
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreThe research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreIn this paper, the complexes of Shiff base of Methyl -6-[2-(diphenylmethylene)amino)-2-(4-hydroxyphenyl)acetamido]-2,2-dimethyl-5-oxo-1-thia-4-azabicyclo[3.2.0]heptane-3-carboxylate (L) with Cobalt(II), Nickel(II), Cupper(II) and Zinc(II) have been prepared. The compounds have been characterized by different means such as FT-IR, UV-Vis, magnetic moment, elemental microanalyses (C.H.N), atomic absorption, and molar conductance. It is obvious when looking at the spectral study that the overall complexes obtained as monomeric structure as well as the metals center moieties are two-coordinated with octahedral geometry excepting Co complexes that existed as a tetrahedral geometry. Hyper Chem-8.0.7
... Show MoreThis work investigates the effect of the gas nitriding process on the surface layer microstructure and mechanical properties for steel 37, tool steel X155CrVMo12-1 and stainless steel 316L. Nitriding was conducted at a temperature of 550 °C for 2 hours during the first stage and at 750 °C for 4 hours during the second stage. SEM and X-ray diffraction tests were performed to evaluate the microstructural features and the major phases formed after surface treatment. SEM and X-ray diffraction tests were performed to assess the microstructural features and the primary phases formed after surface treatment. The new secondary precipitates were identified as γ′-Fe4N, ε (Fe2–3N), and α-Fe, exhibiting an uneven chain-like pattern wit
... Show MoreThe amount of protein in the serum depends on the balance between the rate of its synthesis, and that of its catabolism or loss. Abnormal metabolism may result from nutritional deficiency, enzyme deficiency, abnormal secretion of hormones, or the actions of drugs and toxins. Renal cancer is the third most common malignancy of the genitourinary system, and accounts for 3% of adult malignancies globally. Total serum proteins were measured in malignant kidney tumor, benign kidney tumors, and non tumoral kidney diseases patient groups, as well as in healthy individuals. A significant decrease (p< 0.001) of total serum protein levels in patients with malignant kidney tumors when compared with those of benign tumors, non tumoral diseases, and hea
... Show More