The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Introduction and Aim: Klebsiella pneumoniae is a Gram-negative bacterium responsible for a wide range of infections, including respiratory tract infections (RTIs). This research was aimed to study the antibacterial and anti-biofilm effect of AgNPs produced by Gram positive and negative bacteria on RTIs associated with K. pneumoniae. Materials and Methods: The biofilm formation of K. pneumoniae was determined by tube method qualitatively from select bacterial species characterized by UV-Visible spectroscopy. The antibacterial susceptibility of the bacteria AgNPs was tested for their antibacterial and antibiofilm activity on a clinical isolate of K. pneumoniae. Results: K. pneumoniae isolated from RTIs were strong biofilm prod
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.
The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.
The research consists of:
Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.
Theoretical framewo
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Theoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
The Gulf Cooperation Council (GCC) is the only one in the Arab system, which has been able to formulate a strategic vision with its dimensions and objectives, and that for its great achievements have contributed significantly to the development of the external and internal economic relations of the Gulf Cooperation Council six through the consolidation of economic policies, projects and joint institutions . There is no doubt that the establishment of the Cooperation Council for the Arab Gulf States six, has made security expensive as long as the aspiration to them the leaders and peoples of the region is the adoption of the GCC countries on itself in order to build a self strength ensures cut off the road to all interference in the affai
... Show More