Preferred Language
Articles
/
ChgOTJcBVTCNdQwC_pcQ
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Effect of Size and Location of Square Web Openings on the Entire Behavior of Reinforced Concrete Deep Beams
...Show More Authors

This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee

... Show More
View Publication
Crossref (15)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Torsional Resistance of Reinforced Concrete Girders with Web Openings
...Show More Authors
In this study, a three dimensional finite element analysis was utilized to study the behavior of reinforced concrete T-
girders with and without web openings under pure torsion by using
ANSYS
APDL
... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Study of rheological and mechanical properties of bitumen blended with two alpha phases of polyamide
...Show More Authors

The effect of D phase polyamide (PA6)on the rheological properties, Young Modulus and the thermal expansion coefficient of two blends groups (bitumen-polyamide) were tested. The first group was for bitumen-PA6 blends and the second group for bitumen blended with polymer resulted from the crystallization of PA6-formic acid solution in water(PAFW).The obtained results proved that adding both types of polyamide has led to a rise in toughness and softening point temperature while the penetration Index approached -3 after adding the polyamide. So, all these changes make bitumen-polyamide blends more suitable for use in hot climate regions. The blends properties were explained according to the reaction that takes place between the polyamide and

... Show More
Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Study of rheological and mechanical properties of bitumen blended with two alpha phases of polyamide
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
User-Oriented Preference Toward a Recommender System
...Show More Authors

            Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Using Mouse Dynamics for Continuous User Authentication
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon Mar 31 2025
Journal Name
The Iraqi Geological Journal
Evaluation of Machine Learning Techniques for Missing Well Log Data in Buzurgan Oil Field: A Case Study
...Show More Authors

The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetics Contents of Data Visualization as an Input to its humanization
...Show More Authors

The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve

... Show More
View Publication Preview PDF
Crossref