9 research outputs found
Developed Clustering Algorithms for Engineering Applications: A Review
Clustering algorithms play a pivotal role in the field of engineering, offering valuable insights into complex datasets. This review paper explores the landscape of developed clustering algorithms with a focus on their applications in engineering. The introduction provides context for the significance of clustering algorithms, setting the stage for an in-depth exploration. The overview section delineates fundamental clustering concepts and elucidates the workings of these algorithms. Categorization of clustering algorithms into partitional, hierarchical, and density-based forms lay the groundwork for a comprehensive discussion. The core of the paper delves into an extensive review of clustering algorithms tailored for engineering applications. Each algorithm is scrutinized in dedicated subsections, unraveling their specific contributions, applications, and advantages. A comparative analysis assesses the performance of these algorithms, delineating their strengths and limitations. Trends and advancements in the realm of clustering algorithms for engineering applications are thoroughly examined. The review concludes with a reflection on the challenges faced by existing clustering algorithms and proposes avenues for future research. This paper aims to provide a valuable resource for researchers, engineers, and practitioners, guiding them in the selection and application of clustering algorithms for diverse engineering scenarios
Distributed Systems for Artificial Intelligence in Cloud Computing: A Review of AI-Powered Applications and Services
The synergy of distributed frameworks with Artificial Intelligence (AI) is pivotal for advancing applications in cloud computing. This review focuses on AI-powered applications in distributed systems, conducting a thorough examination. Analyzing foundational studies and real-world applications, it extracts insights into the dynamic interplay between AI and distributed frameworks. Quantitative measures allow a nuanced comparison, revealing diverse contributions. The survey provides a broad overview of the state-of-the-art, spanning applications like performance optimization, security, and IoT integration. The ensuing discussion synthesizes comparative measures, significantly enhancing our understanding. Concluding with recommendations for future research and collaborations, it serves as a concise guide for professionals and researchers navigating the challenging landscape of AI-powered applications in distributed cloud computing platforms
The ethical dilemma of software piracy: an inquiry from an Islamic perspective
Software piracy in the Muslim countries is a prevailing issue. It has been estimated based
on BSA by 2009 that more than 90% of software in Yemen is pirated, followed by Libya 88%,
Indonesia 86%, and Iraq 85%. UAE has the lowest rate for software piracy, which is 36%.
While in the Middle East area, the piracy rate is around 59% with total commercial value
of $2,887 Million. Furthermore, the software piracy remains a critical issue in Asia Pacific,
with the region accounting for the highest dollar losses in the world from the use of unlicensed
software. The survey of software piracy around the world, which is collaboration between
the Business Software Alliance (BSA) and IDC, indicates that software piracy on personal
computers in the Asia Pacific region in November 2009 was 61 percent, worth 15,000
million U.S. dollars (BSA, 2009; IDC Global PC). The purpose of this study is to understand
the software piracy from Islamic perspective and finding the recommendations, solutions of
this problem to deter software piracy as much as possible. Focusing on the Islamic rule,
evidence and argument relating to copyright infringement especially software piracy in the
Islamic world; additionally, the effect of software piracy
Cybernetic Deception: Unraveling the Layers of Email Phishing Threats
E-mail phishing, a tireless and versatile cybersecurity risk, requires a intensive examination to fortify organizational resistances. This broad survey dives into the multifaceted measurements of e-mail phishing, including mental control strategies, mechanical complexities, and real-world experiences determined from assorted case considers. The investigation of location and anticipation procedures covers a extend of commitments, tending to half breed machine learning approaches, the significance of client instruction, and the part of administrative compliance. These procedures give a significant system for organizations pointing to improve their flexibility against the energetic scene of phishing strategies. The theoretical underscores the administrative landscape's significant part in forming cybersecurity hones, advertising a organized establishment for organizations to adjust with legitimate prerequisites. Expecting future patterns and challenges, such as the integration of characteristic dialect preparing procedures and the complexities of cloud-based phishing assaults, gets to be basic for maintained cyber versatility. In conclusion, this paper serves as a comprehensive direct, enabling people and organizations with the information and methodologies required to explore the complex scene of e-mail phishing dangers. It recognizes the energetic nature of the danger scene, highlighting the progressing travel in combating computerized duplicity and invigorating preparation against the ever-evolving strategies of phishing foes
A new algorithm for human face detection using skin color tone
Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. There are many applications with respect to security, sensitivity and secrecy. Face detection is the most important and first step of recognition system. This paper introduces a new approach to face detection systems using the skin color of a subject. This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide. In face detection, the two respective classes are the "face area" and the "non-face area". This new approach to face detection is based on color tone values specially defined for skin area detection within the image frame. This system first resizes the image, and then separates it into its component R, G, and B bands. These bands are transformed into another color space which is YCbCr space and then into YCโbCโr space (the skin color tone). The morphological process is implemented on the presented image to make it more accurate. At last, the projection face area is taken by this system to determine the face area. Experimental results show that the proposed algorithm is good enough to localize a human face in an image with an accuracy of 92.69%
BLOGGING: A NEW PLATFORM FOR SPREADING RUMORS!
Blogs are a popular way to share personal journals, discuss matters of public opinion, pursue collaborative conversations, and aggregate content on similar topics. Blogs can be also used to disseminate new content and novel ideas to communities of interest. In this paper we present about the use of blogging in spreading rumors. Most blogs are interactive, allowing visitors to leave comments and even message to each other through widgets on the blogs and it is this interactivity that distinguishes them from other static websites. Topical content such as news and political commentary spreads quickly by the hour and then quickly disappears, while non-topical content such as music and entertainment propagates slowly over a much long period of tim
The Ethical Dilemma of Software Piracy: An Inquiry from an Islamic Perspective
Software piracy in the Muslim countries is a prevailing issue. It has been estimated based on BSA by 2009 that more than 90% of software in Yemen is pirated, followed by Libya 88%, Indonesia 86%, and Iraq 85%. UAE has the lowest rate for software piracy, which is 36%. While in the Middle East area, the piracy rate is around 59% with total commercial value of $2,887 Million. Furthermore, the software piracy remains a critical issue in Asia Pacific, with the region accounting for the highest dollar losses in the world from the use of unlicensed software. The survey of software piracy around the world, which is collaboration between the Business Software Alliance (BSA) and IDC, indicates that software piracy on personal computers in the Asia Pacific region in November 2009 was 61 percent, worth 15,000 million U.S. dollars (BSA, 2009; IDC Global PC). The purpose of this study is to understand the software piracy from Islamic perspective and finding the recommendations, solutions ofthis problem to deter software piracy as much as possible. Focusing on the Islamic rule, evidence and argument relating to copyright infringement especially software piracy in the Islamic world; additionally, the effect of software pirac
Blogging: a new platform for spreading rumors!
Blogs are a popular way to share personal journals, discuss matters of public opinion, pursue collaborative conversations, and aggregate content on similar topics. Blogs can be also used to disseminate new content and novel ideas to communities of interest. In this paper we present about the use of blogging in spreading rumors. Most blogs are interactive, allowing visitors to leave comments and even message to each other through widgets on the blogs and it is this interactivity that distinguishes them from other static websites. Topical content such as news and political commentary spreads quickly by the hour and then quickly disappears, while non-topical content such as music and
entertainment propagates slowly over a much long period of time
Recommendation System for Determining the Best Banner Supplier Using Profile Matching and TOPSIS Methods
Background: Choosing a banner supplier is a significant challenge for digital printing companies due to the various advantages offered by each supplier, often leading to selections based on subjective aspects such as price and quality. Objective: This research aims to develop a system that determines the best banner supplier to minimize production inefficiencies and maximize profits by comparing two calculation methods, Profile Matching and TOPSIS. Methods: A quantitative study was conducted using transaction data from the last six months. The parameter criteria used in this system include price, quality, delivery, availability, and payment terms. The study compares the effectiveness of Profile Matching and TOPSIS methods in identifying the best supplier. Results: The study results show that the TOPSIS method is superior, yielding 100% accuracy, 84% recall, and a 92% F1-score, outperforming the Profile Matching method. This demonstrates that the correct method and algorithm effectively provide the best alternative recommendations. Conclusion: The results indicate that using the TOPSIS method leads to more accurate and objective decisions based on predetermined criteria. The findings suggest that further research should focus on refining these methods to enhance decision-making in supplier selection