To expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk about the advantages and disadvantages of thesemethods. Finally, we offer our thoughts on where this field of study is headed and where furtherresearch is needed. The importance of parallel machine learning for businesses that want to gleaninsights from massive datasets is emphasised, and the paper provides a thorough introduction of thediscipline.
This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreSoil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use
... Show MoreThis study delves into the realm of advanced cooling techniques by examining the performance of a two-stage parallel flow indirect evaporative cooling system enhanced with aspen pads in the challenging climate of Baghdad. The objective was to achieve average air dry bulb temperatures (43 oC) below the ambient wet bulb temperatures (24.95 oC) with an average relative humidity of 23%, aiming for unparalleled cooling efficiency. The research experiment was carried out in the urban environment of Baghdad, characterized by high temperature conditions. The investigation focused on the potential of the two-stage parallel flow setup, combined with the cooling capability of aspen pads, to surpass the limitat
... Show MoreThe research aimed at identifying the relationship between motivation and self–confidence on the performing routines in the parallel bar. The researchers used the descriptive method on (480) thirds year college of physical education and sport sciences/ university of Baghdad students. The data was collected and treated using proper statistical operations to conclude that there is a high correlation relationship between motivation and self-confidence with routine performance on parallel bars. In addition to that, the researchers concluded that third-year students have high motivation and self – confidence and there is a positive relationship between motivation, self-confidence, and routine performance on parallel bars.
The availability of different processing levels for satellite images makes it important to measure their suitability for classification tasks. This study investigates the impact of the Landsat data processing level on the accuracy of land cover classification using a support vector machine (SVM) classifier. The classification accuracy values of Landsat 8 (LS8) and Landsat 9 (LS9) data at different processing levels vary notably. For LS9, Collection 2 Level 2 (C2L2) achieved the highest accuracy of (86.55%) with the polynomial kernel of the SVM classifier, surpassing the Fast Line-of-Sight Atmospheric Analysis of Spectral Hypercubes (FLAASH) at (85.31%) and Collection 2 Level 1 (C2L1) at (84.93%). The LS8 data exhibits similar behavior. Conv
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show More