Preferred Language
Articles
/
ChgOTJcBVTCNdQwC_pcQ
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Recovery of Platinum and Palladium from Scrap Automotive Catalytic Converters
...Show More Authors

Abstract

    

The hydrometallurgical method was used to platinum and palladium leaching with aqua regia solution (3HCl: HNO3). The leaching experiments were designed to obtain the optimum conditions by using Taguchi method with 16 experiments at three different factors (time, temperature and solid to liquid ratio), and each factor has four different levels. In this study, leaching the powder sample of catalytic converter that contains platinum and palladium was conducted on the basis of the formation of chloro complexes platinum and palladium (PtCl62-, PdCl42-) with different concentrations in the acidic solution. The optimum condi

... Show More
View Publication Preview PDF
Crossref (23)
Crossref
Publication Date
Mon Jun 02 2008
Journal Name
Iraqi Postgraduate Medical Journal
[PDF] from iasj.net Isolation of tRNA From Uropathogenic Escherichia Coli
...Show More Authors

Thirty uropathogenic E. coli isolates were isolated from hospitalized and non hospitalized patients, complaining of urinary tract infections, of Al-Kadhymia Teaching Hospital and subjected to tRNA extraction. A method of tRNA extraction was modified by adding sodium dodecyl sulfate (SDS) instead of urea. Polyacrylamide gel electrophoresis and two methods of staining, ethidium bromide staining and silver staining, as well as spectrophotometric detection were used.

Publication Date
Sun Aug 03 2025
Journal Name
Al–bahith Al–a'alami
The extent of Concern of the University Press in Students’ Issues (Journal of the University of Technology as a Model) for the Period from 2009 to 2012
...Show More Authors

The university press is an essential pillar in building an academic community to achieve its objectives in the service of society. Since the university press is a means of university media, which is issued by the departments or units of media in Iraqi universities as academic governmental-institutions, so it highlights the activities of the university and link them to its internal society in the first place as the university press is a mirror of the university and its voice is sincerely expressed. This research comes to know the extent of interest of the university press in various student issues.

In order to identify the problem of the research, the method of content analysis was adopted within the survey method

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PHYSIO-CHEMICAL ANALYSIS OF SAMPLES OF SOIL SELECTED FROM DIFFERENT AGRICULTURE AREAS FROM AL-NAJAF: PHYSIO-CHEMICAL ANALYSIS OF SAMPLES OF SOIL SELECTED FROM DIFFERENT AGRICULTURE AREAS FROM AL-NAJAF
...Show More Authors

The twelve samples of agricultural soils from four regions in Al-Najaf governorate with sampling plant with soil. Physical properties of the soil where studied, such as electrical conductivity ranged from (136.33-1070.00)μS/cm-3, and moisture which ranged between the values (0.39-36.48)%. The chemical analysis of the soil have included the proportion of calcium carbonate the ratio between (44.00-48.00%) has been observed increasing amounts of calcium carbonate in surface models. The pH where results indicate that pH values ​​were close to study models ranged between (6.88-7.42) these values ​​generally within the normal range for the measured pH values ​​of the Iraqi soil. The amount of gypsum ranged betwe

... Show More
View Publication Preview PDF