Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets. Thus, new detection technique will improve the overall performance of computer network.
This aim research of this discussion impact of investment in human capital dimensions (training, education, knowledge management, skills development) and its components (knowledge, skills, abilities, value) with the Office of the Inspector General's staff - Ministry of Culture in Iraq, has depended questionnaire as a tool in the collection data and information ,subjected to a measure of validity and reliability, and distributed to a sample of (63) individuals were distributed in positions (director, director of the Division of employees) have been analyzed data search using ready-statistical software (SPSS) the used hypothesis testing and correlati
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThis research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the import
The problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female
... Show MoreThe research amid to measure the extent of the Suggested procedures of the internal control in accordance with the updated COSO framework in improving the procedures for internal control work in Iraqi oil companies. As the research problem was represented in suggesting procedures for internal control according to the updated COSO framework and finding out the relationship of correlation and influence between the suggested procedures and the internal control procedures that are done in the Iraqi oil companies. The research followed the quantitative approach to handling and analysing data by designing a Questionnaire to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies,
... Show MoreA high percentage of existing buildings in Iraq are traditional buildings, yet there is approximately no such green building in Baghdad or other governorates. Most of these buildings require urgent upgrading to increase their performance (operationally, economically, and environmentally), also the building owners looking for identifying and implementing many of the green building measures to reduce the operational and maintenance costs of their buildings. The decision-makers need to support the possibility of achieving sustainable measures of existing building rating systems such as LEED or BREEAM, and that would require an optimization model. The goal of this study is to maximize the
Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreImage pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show More