Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the improved algorithm can detect this type of anomaly. Thus, our approach is effective in finding abnormalities.
This study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreBACKGROUND: Polycystic ovary syndrome(PCOS) is one of the most common endocrine disorder affecting women in reproductive age. No single etiologic factor fully accounts for the spectrum of abnormalities in the polycystic ovary syndrome. Different changes in hormonal, metabolism and the inflammatory markers as squealy of PCOS with adverse effect on the women life. OBJECTIVE: To study the relationship between polycystic ovary syndrome and levels of C-reactive protein, human interleukin and hormonal and metabolic alteration in women with PCOS PATIENTS AND METHODS: Thirty women with Polycystic Ovary syndrome (PCOS) and other thirty women without PCOS were included. Venous blood samples were taken in early follicular phase of menstrual cycle [day
... Show More: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
Background: Worldwide gastric cancer is the fifth most common cancer with poor prognosis. In early stages, it is hard to distinguish gastric cancer from benign gastric diseases, resulting in delayed diagnosis. There is a need to develop a biomarker for differentiating between gastric cancer and benign gastric diseases. Serum cholinesterase is synthesized in liver and released into plasma, and it has an important role in oncogenesis.
Objectives: To determine the correlation between serum cholinesterase activity and gastric cancer, in comparison to benign gastric diseases.
Subjects and Methods: A case control study carried out at Medical City Direct
... Show MoreBackground: Polycystic ovarian syndrome is one of the common gynaecological diseases encountered nowadays in the gynaecological clinic. Many criteria and diagnostic test had been evolved to be used with different classifications methods.Objectives: The present study aimed to measure the anti-mullerian hormone levels in serum of the women with Polycystic Ovary Syndrome and to test the possibility that if it can be used as a marker for diagnosis of polycystic ovary syndrome patients.Methods: A cross sectional study that had been conductedat Kamal AL-Samaraee Hospital, AL-Suwayrah Hospital andAl-Elwiya Maternity Teaching Hospital during the periodfrom July, 1st, 2013 – Jan. 1st, 2014. Where forty women withPolycystic ovarian syndrome (wit
... Show MoreThe research discusses the most important goals and means of IGAD in making peace in Sudan and then regional peace.
|
This research addressed the cultural factors that are affecting the communicator in international public relations in light of the theory of the cultural relativism. The research aimed to find out the nature of cultural differences between societies and how can for professionals in international public relations understanding the culture of other and communicate with him peacefully. The researcher used qualitative and interpretative methodology. Some of the important results of the research are: The Communities are affected by cultural factors that are composed from values, customs, traditions, prevailing and inherited ethic, languages, religious beliefs, fashion, gender, colors indi |
Emergency vehicle (EV) services save lives around the world. The necessary fast response of EVs requires minimising travel time. Preempting traffic signals can enable EVs to reach the desired location quickly. Most of the current research tries to decrease EV delays but neglects the resulting negative impacts of the preemption on other vehicles in the side roads. This paper proposes a dynamic preemption algorithm to control the traffic signal by adjusting some cycles to balance between the two critical goals: minimal delay for EVs with no stop, and a small additional delay to the vehicles on the side roads. This method is applicable to preempt traffic lights for EVs through an Intelli
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More