The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Capparis spinosa is one of the oldest genera grown in Iraqi land with worldwide traditional medicinal uses beside the culinary uses. These uses were own to the presence of many phytochemical including flavonoids, polyphenols. Among the reported polyphenolic acids are caffeic, chlorogenic and ferulic acids with well-known powerful antioxidant properties. The present work aimed to identify the presence of these polyphenolic acids in Iraqi caper naturally gown in the rural area of middle Iraq following standard chromatographic procedures. Aerial parts of the plant (buds, berries and leaves) were extracted with hydroalcoholic solvent by maceration method. Thin layer chromatographic techniques and HPLC analysis were performed to iden
... Show MoreA new novel series of metalcomplexes are prepared from reactions between 2-benzoylthio- benzimidazole (L) with metal salts of Co (II) , Fe(III) and Rh (III) , while Pd(II) complex was obtained by mixing ligandsof 2-benzoylthiobenzimidazole (L) as primary ligand and bipyridine (L/)as secondary ligand as well as palladium chloride as metal salt in an ethanoic medium. The geometry of these compounds were identified using C.H.N.microanalysis, Ultraviolet–visible, Fourier transforms infrared, magnetic susceptibility, molar conductivity and flame atomic absorption (A.A). From the dataobtained by these spectral analyses, the molecular structures for Rh and Fe complexes were proposed to be octahedral geometry. A square planar const
... Show MoreThe current study aims to determine the prevalence of Trichomonas vaginalis and Candida spp., and also to identify Candida parapsilosis and some virulence genes. It was conducted in Bint Al-Hoda Hospital of Maternity and Children in Thi-Qar province, south of Iraq for the period from the beginning of January to the end of December 2020. Two hundred and fifty samples were collected from the female genital tract for women whose age ranged between 17-50 years. Microscopic, traditional and molecular tests were used in the sample examination. The results recorded 12 (4.8%) samples infected with T. vaginalis parasite, whereas 130 (52%) samples showed Candida yeast distributed as follows: 75 (30 %) <
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
A total of 60 samples of drinking water filtrated by Reverser 0smosis Filtration System from April to October 2012, from different houses in Baghdad – Al Resafa, so as to identify the eggs and cysts of protozoa. Two methods applied direct smear and staining technique with zeal nelson stain, which appeared Tape warm eggs, Ascaris lumbrecoides eggs and oocyst of Cryptospordium sp. This study revealed that total contamination rate with intestinal parasites in tap water were 96.6% this high rate, refers to filtrate tap water by reverse osmosis system was useful to prevent or reduce the contamination of drinking water, in order to reduce risks to public health; So recommended to apply this method at water purification stations. Dis
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe shortage in surface water quantities led to a shift in dependence on the groundwater as an alternative water source in southern parts of Iraq. The groundwater is decreasing in quantity and water quality is degrading due to different factors. Therefore, it is important to assess the groundwater quality of the Missan Governorate of the country by analyzing the physicochemical parameters and distinguishing the probable sources of contaminants in the area. The present study used water quality diagrams and statistical methods such as factor analysis and agglomerative cluster analysis to determine the sources of chemical ions in the forty-four groundwater samples collected from wells in the study area. In addition, the Water Quality Index (WQ
... Show MoreFacial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show More